Professional Documents
Culture Documents
INTRODUCTION
Department of MCA
P.E.S.C.E Mandya
2012
2
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER 1
1.
INTRODUCTION
Passwords are used for (a) Authentication (Establishes that the user is who theysay they are). (b) Authorization (The process used to decide if theauthenticated person is allowed to access specificinformation or functions) and(c) Access Control (Restriction of access-includes authentication & authorization). Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that the passwords tend to follow predictable patterns that are easier for attackers to guess. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Number of graphical password systems have been developed, Study shows that text-based passwords suffers with both security and usability problems. According to a recent news article, a security team at a company ran a network password cracker and within 30 seconds and they identified about 80% of the passwords . It is well know that the human brain is better at recognizing and recalling images than text, graphical passwords exploit this human characteristic. Here a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points.
Department of MCA
P.E.S.C.E Mandya
2012
3
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
PREVIOUS WORK Considerable work has been done in this area,The best known of these systems are Passfaces . Brostoff and Sasse carried out an empirical study of Passfaces, which illustrates well how a graphical password recognition system typically operates. Blonder-style passwords are based on cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by Passlogix Corporation (Boroditsky), the user chooses several predefined regions in an image as his or her password. To log in the user has to click on the same regions. The problem with this scheme is that the number of predefined regions is small, perhaps a few dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the user. Another problem of this system is the need for the predefined regions to be readily identifiable. In effect, this requires artificial, cartoon-like images rather than complex, real-world scenes. Cued Click Points (CCP) is a proposed alternative to PassPoints. In CCP, users click one point on each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning). It also makes attacks based on hotspot analysis more challenging. As shown in Figure 1, each click results in showing a next-image, in effect leading users down a path as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images.:
PROPOSED WORK In the proposed work we have integrated sound signature to help in recalling the password. No Department of MCA P.E.S.C.E Mandya 2012
4
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
system has been devolved so far which uses sound signature in graphical password authentication. Study says that sound signature or tone can be used to recall facts like images, text etc. In daily life we see various examples of recalling an object by the sound related to that object . 3.1. Profile VectorsThe proposed system creates user profile as followsMaster vector (User ID, Sound Signature frequency, Tolerance) Detailed Vector - (Image, Click Points) As an example of vectors Master vector (Smith , 2689, 50) Detailed Vector( ) Image Click points 1 (123,678) 2 (176,134) 3 (450,297) 4 (761,164)
Department of MCA
P.E.S.C.E Mandya
2012
5
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
LITERATURE SURVEY
Department of MCA
P.E.S.C.E Mandya
2012
6
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER : 2
LITERATURE SURVEY
2.1 Project Survey
We have proposed a approach which uses sound signature to recall graphical password click points. No previously developed system used this approach this system is helpful when user is logging after a long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text. The module contain User profile Vector(master), Create Detailed Vector, Compare User Profile/login Vector ,The module has a security features with Password facility to ensure validity of user, Intelligent validation for each entry, User defined data access, and Data security. Users click on one point per image for a sequence of images. The next image is based on the previous click-point. We present the results of an initial user study which revealed positive results. Performance was very good in terms of speed, accuracy, and number of errors. Users preferred CCP to Pass Points saying that selecting and remembering only one point per image was easier, and that seeing each image triggered their memory of where the corresponding point was located. We also suggest that CCP provides greater security than Pass Points because the number of images increases the workload for attackers or a sequence of images. The next image displayed is based on the previous click-point so users receive immediate implicit feedback as to whether they are on the correct path when logging in. CCP offers both improved usability and security.
Department of MCA
P.E.S.C.E Mandya
2012
7
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
highly distributed environment of the Internet. The .NET framework is designed to fulfill the following objectives:
Provide a consistent object-oriented programming environment whether object code is stored and executed locally, but internet distributed, or executed remotely. To provide a code-execution environment that minimizes software deployment and versioning conflicts. To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi-trusted third party. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications,
such as windows-based applications and web-based applications. The .NET framework has two main components: the common language runtime and the .NET framework class library. The common language runtime is the foundation of the .NET framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness.Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. The class library, the other main component of the .NET framework, is a comprehensive, objectoriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface applications to applications based on the latest innovations provided by ASP.NET, such as web forms and XML web services.
Department of MCA
P.E.S.C.E Mandya
2012
8
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Web Applications
Console Application
CLASS
LIBRARY
CLR
CTS
CLS
Fig2.1: .Net Framework Deliver solutions anywhere, anytime, and on any device Migrate legacy solutions develop using the tools and languages of choice better develop, deliver, and maintain solution produce Secured, stable, and manageable solutions
Department of MCA
2012
9
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Fig:2.2 Common Language The heart of .net Framework isCommon Language Runtime (CLR). All .NET compliant
languages run in a common, managed runtime execution environment. With the CLR, you can rely on code that is accessed from different languages. There is a huge benefit. One coder can write one module in C# and another can access and use it from VB.NET. Automatically object management, the .NET languages take care of memory issues automatically. These are few listed benefits which you get from CLR.
Runtime(CLR)
2.4 ASP.NET
ASP.NET is more than the next version of Active Server Pages (ASP); it provides a unified Web development model that includes the services necessary for developers to build enterprise-class Web applications. While ASP.NET is largely syntax compatible with ASP, it also provides a new programming model and infrastructure for more scalable and stable applications that help provide greater protection. ASP.NET is a compiled, .NET-based environment; we can author applications in any .NET compatible language, including Visual Basic .NET, C#, and Jscript .NET. Additionally, the entire .NET Framework is available to any ASP.NET application. Developers can easily access the benefits of these technologies, which include the managed common language runtime environment, type safety, inheritance, and so on. Developers can use Web Forms or XML Web services when creating an ASP.NET application, or combine these in any way they see fit. Each is supported by the same infrastructure that allows you to use authentication schemes; caches
Department of MCA
P.E.S.C.E Mandya
2012
10
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
frequently used data, or customize your applications configuration, to name only a few possibilities. Web Forms allow you to build powerful forms-based Web pages. When building these pages, you can use ASP.NET server controls to create common UI elements, and program them for common tasks. An XML Web service provides the means to access server functionality remotely. Using XML Web services, businesses can expose programmatic interfaces to their data or business logic, which in turn can be obtained and manipulated by client and server applications. XML Web services enable the exchange of data in client-server or server-server scenarios, using standards like HTTP and XML messaging to move data across firewalls. XML Web services are not tied to a particular component model, and running on any operating system can access XML Web services.
Department of MCA
P.E.S.C.E Mandya
2012
11
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
to manage data local to the application or sourced from XML. The ADO.NET classes are found in System.Data.dll, and are integrated with the XML classes found in System.Xml.dll. When compiling code that uses the System.Data namespace, reference both System.Data.dll and System.Xml.dll. For an example of compiling an ADO.NET application using a command line compiler. ADO.NET provides functionality to developers writing managed code similar to the functionality provided to native COM developers by ADO. For a discussion of the differences between ADO and ADO.NET, see ADO.NET for the ADO Programmer.
ADO.NET Object Model
Department of MCA
P.E.S.C.E Mandya
2012
12
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
DbConnection object: the .NET Framework Data Provider for OLE DB includes an OleDbConnection object, the .NET Framework Data Provider for SQL Server includes a SqlConnection object, the .NET Framework Data Provider for ODBC includes an OdbcConnection object, and the .NET Framework Data Provider for Oracle includes an OracleConnection object.
13
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
a DbDataAdapter object: the .NET Framework Data Provider for OLE DB includes an OleDbDataReader and an OleDbDataAdapter object, the .NET Framework Data Provider for SQL Server includes a SqlDataReader and a SqlDataAdapter object, the .NET Framework Data Provider for ODBC includes an Odbc DataReader and an OdbcDataAdapter object, and the .NET Framework Data Provider for Oracle includes an OracleDataReader OracleDataAdapter object.
THE DATASET
DataSets in ADO .NET are objects that store data in a memory cache, allowing access to the data even with the application disconnected from the databases. The structure of a System.Data.DataSet is similar to that of a relational database. It is organized in a hierarchical object mode of tables, rows, columns, constraints, and relationships. A DataSet can be typed or untyped. Typed DataSets derive its table and column structure from a schema file and is easier to program. Either a typed or untyped dataset can be used in applications. ADO.NET gives better support to typed datasets. A DataSet is located in System.Data NameSpace. DataSets are memory structures that do not contain any data by default. DataSets will have to be filled with data. This can be done in several ways.
Department of MCA
P.E.S.C.E Mandya
2012
14
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
The following five points explains what the critical high availability solution areas are, why and what Oracles offerings in each of these areas are. SQL SERVER is one of the leading database management systems (DBMS) because it is the only Database that meets the uncompromising requirements of todays most demanding information systems. From complex decision support systems (DSS) to the most rigorous online
transaction processing (OLTP) application, even application that require simultaneous DSS and OLTP access to the same critical data, SQL Server leads the industry in both performance and capability SQL SERVER is a truly portable, distributed, and open DBMS that delivers unmatched
performance, continuous operation and support for every database. SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially
designed for online transactions processing and for handling large database application. SQL SERVER with transactions processing option offers two features which contribute to
very high level of transaction processing throughput, like The row level.
Department of MCA
P.E.S.C.E Mandya
2012
15
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
This prepares for a possible future in which the software developed for .NET is portable to a wide variety of hardware and operating system foundations. (Beta one of Visual Studio.NET supports all versions of Windows 2000 plus Windows NT4, Windows 9x, and Windows. The major components of the .NET framework are shown in the below diagram:
Fig 2.4 The .NET Framework Overview The framework starts all the way down at the memory management and component loading level, and goes all the way up to multiple ways of rendering user and program interfaces. In between, there are layers that provide just about any system-level capability that a developer would need. At the base is the Common Language Runtime, often abbreviated to CLR. This is the heart of the .NET framework, the engine that drives key functionality. It includes, for example, a common system of data types. These common types, plus a standard interface convention, make crosslanguage inheritance possible. In addition to allocation and management of memory, the CLR also does reference counting for objects, and handles garbage collection. The middle layer includes the next generation of standard system services such as ADO.NET and XML. These services are brought under the control of the framework, making them universally available and standardizing their usage across languages. The top layer includes user and program interfaces. Windows Forms (often informally referred to
Department of MCA
P.E.S.C.E Mandya
2012
16
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
as Win Forms) are a new way to create standard Win32 desktop applications, based on the Windows Foundation Classes (WFC) produced for J++. Web Forms provide a powerful, formsbased UI for the web. Web Services, which are perhaps the most revolutionary, provide a mechanism for programs to communicate over the Internet using SOAP. Web Services provide an analog of COM and DCOM for object brokering and interfacing, but based on Internet technologies so that allowance is made for integration even with non-Microsoft platforms. Web Forms and Web Services, comprise the Internet interface portion of .NET, and are implemented through a section of the .NET Framework referred to as ASP.NET. All of these are available to any language that is based on the .NET platform. For completeness, there is also a console interface that allows creation of character-based applications (not shown in the diagram 2.4).
Department of MCA
P.E.S.C.E Mandya
2012
17
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Fig 2.5 The Common Language Runtime Language interoperability is the ability of the code to interact with code that is written using a different programming language. Language interoperability can help maximum code reuse and, therefore, improve the efficiency of the development process. Because developers use a wide variety of tools and technologies, each of which might support different features and types, it has historically been difficult to ensure language interoperability. However, language compilers and tools that target the common language runtime benefit from the runtimes built-in support for language interoperability. To ensure that you can develop managed code that can be fully used by developers using any programming language, a set of language features and rules for using them called the Common Language Specification (CLS) has been defined. Components that follow these rules and expose only CLS features are considered CLS compliant. If your component uses only CLS features in the API that it exposes to other code (including derived classes), the component is guaranteed to be accessible from any programming language that supports the CLS. Components that adhere to the CLS rules and use only the features included in the CLS are said to be CLS-compliant components.
Department of MCA
P.E.S.C.E Mandya
2012
18
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Establish a framework that helps enable cross-language integration, type safety, and high
performance code execution. Provides an object-oriented model that supports the complete implementation of many
programming languages. Define rules that languages must follow, which helps ensure that objects written in
different languages can interact with each other. The CTS also defines the rules that ensure that the data types of objects written in various
.Net Framework4.0
The Microsoft .NET Framework 4 provides the following new features and improvements: Improvements in Common Language Runtime (CLR) and Base Class Library (BCL) Performance improvement including better multicore support, background garbage collection, and profiler attach on server. New memory mapped file and numeric types. Easier debugging including dump debugging, Watson minidumps, mixed mode debugging for 64 bit and code contracts.. Innovations in the Visual Basic and C# languages, for example statement lambdas, implicit line continuations, dynamic dispatch, and named/optional parameters. Improvements in Data Access and Modeling
The .NET Framework 4 also offers significant performance gains for WF-based workflows. Improvements to Windows Communication Foundation (WCF) such as support for WCF Workflow Services enabling workflow programs with messaging activities, correlation support. Additionally, .NET Framework 4 provides new WCF features such as service
Department of MCA
P.E.S.C.E Mandya
2012
19
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
discovery, routing service, REST support, diagnostics, and performance Innovative new parallel-programming features such as parallel loop support, Task Parallel Library (TPL), Parallel LINQ (PLINQ), and coordination data structures which let developers harness the power of multi-core processors.
Advantages of ASP.NET
ASP.NET pages are compiled, not interpreted .Instead of reading and interpreting your code every time a dynamic page is requested, ASP.NET compiles dynamic pages into efficient binary files that the server can execute very quickly. This represents a big jump in performance when compared with the technologys interpreted predecessor, ASP. ASP.NET has full access to the functionality of the .NET Framework. Support for XML, Web Services, database interaction, email, regular expression and many other technologies are built right into .NET which saves you from having to reinvent the wheel. ASP.NET allows you to separate the server-side code in your pages from HTML layout.
Department of MCA
P.E.S.C.E Mandya
2012
20
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Disadvantages of ASP.NET
ASP.NET is a Microsoft technology. While this isnt a problem in itself, it does mean that, at least for now, you need to use a Windows server to run an ASP.NET Website .If your organization uses Linux or some operating system for its Web servers, youre out of luck. Serious ASP.NET development requires an understanding of object-oriented programming.
SIMPLE No Pointers. Unsafe operations such as direct memory access are not allowed. In C# there is no use of :: or -> operator. Since it is on .NET it inherits the features of automatic memory management. Integers value such as 0 and 1 are no longer accepted as Boolean values. Boolean values are
Department of MCA
P.E.S.C.E Mandya
2012
21
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
pure true or false in C# of = operator and == operator. == operator is used for comparison operation and = is used for assignment operation. OBJECT-ORIENTED C# supports data encapsulation, polymorphism, interfaces, and inheritance. (int,float,double) are not objects in java but c# has introduced structures(structs) which enable the primitive type to become objects int i; String a = i.Tostring; //conversion or boxing
INTEROPERABILITY C# includes native support for the computer windows based applications. Allowing restricted use of native pointers. Users need not explicitly implement unknown and other computer interfaces those Features are built in. C# allows the users to use pointers as unsafe code blocks to manipulate your old code
TYPE-SAFE In c3 we cannot perform unsafe casts like convert to a Boolean. Value types are initialized to zeros and reference type objects are initialized to null by the compiler automatically. Arrays are zero based indexed and are bound checked. Overflow of types can be checked.
Department of MCA
P.E.S.C.E Mandya
2012
22
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
IBM was able to demonstrate how to control relational database using SQL. The Structured Query Language (SQL) comprises one of the fundamental building blocks of modern database architecture. SQL defines the methods used to create and manipulate relational databases on all major platforms. At first glance, the language may see intimidating and complex but its really not all that bad. Requirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems and maximize capital and operating budgets. SQL Sever provides the enterprise data management platform your organization needs to adapt quickly in a fast-change environment. With the lowest implementation and maintenance costs in the industry. SQL Server delivers rapid return on your data management investment. SQL Server supports the rapid development of enterprise-class business applications that can give your company a critical competitive advantage. Benchmarked for scalability, speed and performance, SQL Server is a fully enterprise-class database product, providing core support for Extensible Mark-up Language (XML) and Internet queries. A table is a primary database object of sol that is used to store data. A table holds data in the form of rows and columns.
Department of MCA
P.E.S.C.E Mandya
2012
23
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Data Compression Save disk storage. Enable compression option for individual tables or indexes. Compression can improve disk I/O and memory utilization.
Transparent Data Encryption Implements strong encryption keys and certificates to secure data. Does not increase the size of the database.
Data Auditing Enables compliance with security regulations. Simple configuration using SQL Server Management Studio. Minimal impact on performance because audit data is stored outside of SQL Server database files.
Dates and Times New data types: Date, Time, Date Time Offset
File Stream: New data type VarBinary(Max) FileStream for managing binary data.
Table Value Parameters: The ability to pass an entire table to a stored procedure.
Backup Compression Save storage space. Compressed backups can be stored on tape or on disk.
Department of MCA
P.E.S.C.E Mandya
2012
24
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Simple configuration using SQL Server Management Studio. Default state of all backups on a server to be compressed can be configured.
Fig 2.6 MVC Architecture When this paradigm is used properly, the Model should have no involvement in translating the
Department of MCA
P.E.S.C.E Mandya
2012
25
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
format of input data. This translation should be performed by the Controller. In addition, the Model should not carry any responsibility for determining how the results should be displayed. The Model-View-Controller Model offers the following benefits Clarifies application design through separation of data modeling issues from data display and interaction Allows the same data to be viewed in many ways Allows the same data to be viewed by many users Enhances reusability by separating application functionality from presentation Increases flexibility, because data model, user interaction, and data display can be pluggable.
Department of MCA
P.E.S.C.E Mandya
2012
26
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER : 3
Department of MCA
P.E.S.C.E Mandya
2012
27
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
problem or achieve an objective. SRS helps the events to understand their own needs. SRS provides a reference for validation of the final report. A high quality SRS is a perquisite to high quality software. A high quality SRS reduces the development cost.
Functional Requirements for Admin 1. User profile Vector(master) 2. Create Detailed Vector 3. Compare User Profile/login Vector Non-Functional Requirements
These are the requirements that are not directly concerned with specific functions delivered by the software. These include software interface requirements, hardware interface requirements which include all the software and hardware requirements. Many organizations focus on the functional aspect of the system-WHAT it does -rather than the non-functional - HOW it does it. Non-functional elements comprise everything from performance to security to usability. Without clear, early definition of non-functional requirements, it is possible that a system could be delivered which does exactly what the customer wants, but is difficult to use, slow, insecure, or is not scalable. Once again, this can lead to the development rework, although some non-functional areas are so integral to the design of the product, it can be difficult to correct them without starting the project again.
Department of MCA
P.E.S.C.E Mandya
2012
28
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
512 MB and above 60 GB Hard Disk Space and above Table: 3.1 Hardware requirements
3.3
Software Requirements
Windows XP and above ASP.NET SQL Server 2008 C# IIS [Internet Information Server] Visual Studio 2010
Department of MCA
P.E.S.C.E Mandya
2012
29
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
SYSTEM ANALYSIS
CHAPTER : 4
SYSTEM ANALYSIS
4.1 Existing system The advantages of the existing system are as follows:
It is very simple in nature & doesnt provide much functionality, thus reducing complexity of the system. Its provide simplicity in the password It doesnt require employees to know about computers at all i.e. it doesnt require training P.E.S.C.E Mandya 2012
Department of MCA
30
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Because of manual work it doesnt require any investment in computers or any other Peripherals. The existing system it doesnt take too much of time to login a system
The main disadvantages of existing system is security problem. User is difficult to remembering a password. In existing system we didnt use c c p technique. In previous system only predefined points only we click otherwise it wont allow to login Password predictability is very high in previous system. Hacker can easily identify the passwords using some algorithm.
Integration of sound signature is convenient and better way to use, because it brings safety and security User friendly and Compatible on all windows based systems Upgradeable with slight modification in coding. Easy application maintenance due to its robustness P.E.S.C.E Mandya 2012
Department of MCA
31
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Menu driven navigation to facilitate simple and quick access to required functionality. A central database for all the data related to ensure data consistency Easier and faster data entry with menu support In proposed system to difficult to guess a password and hack a particular account
Department of MCA
P.E.S.C.E Mandya
2012
32
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
SYSTEM DESIGN
CHAPTER: 5
SYSTEM DESIGN
5.1 Introduction:
System design is process to design the system, here INTEGRATION OF SOUND SIGNATURE
AND GRAPHICLE PASSWORD AUTHENTICATION SYSTEM IN ARMY. It is a
reduction of an entire system by studying the various operations performed and their relationship within the system and the requirement of its success. One aspect of design is defining the boundaries of the system and determining whether or not the candidate system should consider other related system.
Department of MCA
P.E.S.C.E Mandya
2012
33
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
The idea of system has been more practical and necessary in computerizing the interrelationship and integration of operations, especially when using computers. Thus its a way of thinking organizations and their problems. An organizational consists of several interrelated and interlocking components. The most creative and challenging phase of the system life cycle is system design. The term design describes a final system and the process by which it is developed. It refers to the technical specifications that will be applied in implementing the candidate system. It also includes the construction of programs and program testing. The key question involved here is How the problem should be solved.
5.2 DATABASE
Database Design is an important and challenging task. Good Design requires although understanding of the data associated with an enterprise and how it issued, as well as good grasp of the features supported by the DBMS. Logical database design also known as database design or data modeling, studies basic properties nd interrelationship among data items, with the aim of providing faithful representation of such item in the basic data structure of a database application is to understand what database.The very first in designing business rules applied to the data.
Information the database must store for the given enterprise and what integrity constraints or
DATAFLOW DIAGRAM:
Registration Process
Login Trial
Get Unique ID
Read User ID
Department of MCA
P.E.S.C.E Mandya
2012
34
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Select Image
Nu of Image s<5
Department of MCA
P.E.S.C.E Mandya
2012
35
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Database Table
A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. The general objective of database design is to make the data access easy, inexpensive and flexible to the user.
Field Name UserName Select Image Position play Played Time Int int int
Description Name of user integer Play that video in particular time Integer value
Field Name UserName Select Image Position Play Played Time DOB Sex int int int
Description Username Select particular image position Video will be played Played time is displayed Enter a date of birth Enter a sex
Date Varchar(50)
Department of MCA
P.E.S.C.E Mandya
2012
36
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
File Id Filname
Int char
Number of files in that database Which we uploaded that file name should be mentioned Choose a particular file location
File select
choose
Field name Select field of files play Played time int int
Department of MCA
P.E.S.C.E Mandya
2012
37
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
38
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
where
as
the
validation
process
is
presented
in
hallow
diamond.
Department of MCA
P.E.S.C.E Mandya
2012
39
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
40
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
41
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
S eq u en ce D iag ram :
DataBase
Admin
Upload Files
Upload Files
View User
Department of MCA
P.E.S.C.E Mandya
2012
42
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
43
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
SYSTEM TESTING
Department of MCA
P.E.S.C.E Mandya
2012
44
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER: 6
Department of MCA
P.E.S.C.E Mandya
2012
45
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
To perform black box testing, the analyst examines the specifications stating what the program or module should do and how it should perform under various conditions. Then, test cases are developed for various conditions and submitted for processing. By examining the results, the analyst can examine whether the program performs according the specified requirements.
Integration Testing
Testing two or more modules or functions together with the intent of finding interface defects between the modules or functions. On a larger level, integration testing can involve a putting together of groups of modules and functions with the goal of completing and verifying that the system meets the system requirements. The goal of this testing is to see if the modules can be integrated properly, the emphasis being on testing interfaces between modules .In this project there are two main modules which were developed and were tested for integration.
Department of MCA
P.E.S.C.E Mandya
2012
46
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
The Employee Registration which are posted in one form should be fetched as the employee details in the other form (EMPLOYEE MONTHLY SALARY). This testing of Integration was done and was achieved in this project.
Output Testing:
After performing the validation testing, the next steps are output testing of the proposed system, since no system could be useful if it does not produce the required output in the specific format. The outputs displayed by the systems are tested, by comparing with the format required by the user. Here the output format is considered in two ways: one is on screen and another in printed format.
Validation Testing:
At the culmination of integration testing, software is completely assembled as a package, interfacing errors have been covered and corrected and a final series of software test validation testing was carried out. Validation testing can be defined in many ways, but a simple definition is that validation succeeds when the software functions in a manner that can be reasonably expected by the end user. The validation test includes the validation of the fields of the records. Each field of the records in the modules is tested separately.
Department of MCA
P.E.S.C.E Mandya
2012
47
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Each module is subjected to test run along with sample data. The individually tested modules are integrated into a single system. Testing involves executing the real data information is used in the program the existence of any program defect is inferred from the output. The texting should be planned so that all the requirements are individually tested. The other Validation is the username and password, Only if the person as an authorized he is allowed to enter into the system else he cannot enter. Each and every control which is used in our project is validated. For ex: The user is not allowed to enter character in place of numeric and vice versa. All the required fields should be entered by the user to navigate to the next form.
System Testing
System testing is actually a series of different tests whose primary purpose is to fully the computer based system. Although each test has a different purpose, all work should verify that all system elements have been properly integrated and perform allocated functions, being the most important test, the performance test is covered briefly below: exercise
Performance testing:
Performance testing is designed to test the run-time performance of software within the context of an integrated system. Performance testing occurs throughout all steps in the testing process. Even at the unit level, the performance of an individual module may be accessed as tests are conducted. However, it is not until all system elements are fully integrated that the true performance of a system can be ascertained. Website Cookie Testing Cookie is small information stored in text file on users hard drive by web server. This information is later used by web browser to retrieve information from that machine. Generally
Department of MCA
P.E.S.C.E Mandya
2012
48
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
cookie contains personalized user data or information that is used to communicate between different web pages. Cookies are nothing but the users identity and used to track where the user navigated throughout the web site pages. The communication between web browser and web server is stateless.
Test cases 1
Expected output Display an Error Message Cant connect database. Login Accept database
name(connect data base) Enter Patient ID Display an Error Accept Message Error in connection Connection string. Enter ID(valid connection string) Invalid user name Display message username Valid user name User Logged in and gets list of names. an string string connection string error Display an error invalid message invalid username User Logged in and gets list of names. Accept patient name Accept Patient Name Patient Accept connection Accept
of
Failed
Passed
Verification of Log In
Passed
Passed
7 8
Failed Passed
Passed
Department of MCA
P.E.S.C.E Mandya
2012
49
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
not exit.
Passed
Passed
IMPLEMENTATION
Department of MCA
P.E.S.C.E Mandya
2012
50
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER: 7
IMPLEMENTATION
Implementation is the process of converting a new or a revised system design into an operational One. The objective is to put the new or revised system that has been tested into operational while holding costs, risks, and personal irritation to the minimum. A critical aspect of the implementation process is to ensure that there will be no disrupting the functioning of the organization. The best method for gaining control while implanting any new system would be to use well planned test for testing all new programs. Before production files are used to test live data, test files must be created on the old system, copied over to the new system, and used for the initial of each program. Another factor to be considered in the implementation phase is the acquisition of the hardware and software. Once the software is developed for the system and testing is carried out, it is then the process of making the newly designed system fully operational and consistent in performance . for this the following steps will be followed for the implementation of the system.
Implementation planning:
Department of MCA
P.E.S.C.E Mandya
2012
51
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
A through and logical thought should be put in for planning the implementation , which Involves sound knowledge in the following areas:
System training plan Equipped installation plan System conversion plan System test plan
Department of MCA
P.E.S.C.E Mandya
2012
52
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CONCLUSION
Department of MCA P.E.S.C.E Mandya 2012
53
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER: 8
CONCLUSION
We have proposed a system which uses sound signature to recall graphical password click points. No previously developed system used this approach this system is helpful when user is logging after a long time. In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text. .
Department of MCA
P.E.S.C.E Mandya
2012
54
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
FUTURE ENHANCEMENT
Department of MCA P.E.S.C.E Mandya 2012
55
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
CHAPTER: 9
FUTURE ENHANCEMENT
In future systems other patterns may be used for recalling purpose like touch of smells, study shows that these patterns are very useful in recalling the associated objects like images or text.
Department of MCA
P.E.S.C.E Mandya
2012
56
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
57
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
BIBLIOGRAPHY
BIBLIOGRAPHY
[1] Mathew MacDonald, Begining ASP.NET 3.5 in c# 2008, Second edition [2] Jason Beres,Et.Al, Mathew MacDonald ,Visual Basic .NET Programming BIBLE, Wiley Dreamtech India Pvt.Ltd, By Bill Evjen, [3] Bill Evjen, Rockford Lhotka, Billy Hollis, Bill Sheldon, Kent Sharkey, Tim Mccarthy,Rama Ramachandran, Professional Visual Basic 2005, Wiley Dreamtech Publications, Edition 2006. [4] Microsoft SQL Server 2008 Database Design And Implementation, Prentice Hall Of
Department of MCA
P.E.S.C.E Mandya
2012
58
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Inadia, Second Edition By Microsoft Corporation. [5] Bible, Mridula Parihar Et Al, ASP.NET.Published By Hungry Minds, Inc,909 Third Avenue New York,NY 10022.
Websites:
Department of MCA
P.E.S.C.E Mandya
2012
59
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
SCREEN SHOTS
Home Page
Department of MCA
P.E.S.C.E Mandya
2012
60
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
61
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
62
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Admin Login
Department of MCA
P.E.S.C.E Mandya
2012
63
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Upload files
View User
Department of MCA
P.E.S.C.E Mandya
2012
64
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
65
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
66
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Airforce Registration
Department of MCA
P.E.S.C.E Mandya
2012
67
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Airforce Login
Department of MCA
P.E.S.C.E Mandya
2012
68
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
69
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Defence registration
Department of MCA P.E.S.C.E Mandya 2012
70
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
71
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Defence login
72
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
73
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
74
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Navy Registration
Department of MCA
P.E.S.C.E Mandya
2012
75
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Navy Login
Department of MCA
P.E.S.C.E Mandya
2012
76
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012
77
INTEGRATION OF SOUND SIGNATURE AND GRAPHICLEPASSWORD AUTHENTICATION SYSTEM IN ARMY
Department of MCA
P.E.S.C.E Mandya
2012