Three level password system using python
Three level password system using python
password system
using python
Contents
• Introduction
• Background/Problem statements
• Working of the project
• Advantages
• System Description
• Project lifecycle
• Application
INTRODUCTION
• It is an authentication system that only allows users to access the
system if they have entered the correct password.
• The project includes three levels of user authentication – Textual,
Image and Graphical.
• In this project, the front end involves Html, CSS and JavaScript and the
back end involves Python. The database: used is MySQL Database and
Django is used for the framework.
PROBLEM STATEMENTS
• Nowadays, we have known that computer security mostly depends on
passwords to verify and authenticate users.
• There are many authentication schemes proposed and most of them
still have weaknesses
• Some of them are based on the physical and behavioural properties
of the user such as voice recognition, and some others are based on
knowledge of the user such as textual and graphical passwords.
However, these schemes are still not secure enough and allow
attackers to steal the data easily.
WORKING OF THE PROJECT
• Our python-based consists of 1 module - User. The user can register
by adding and entering a conventional alphanumeric password.
• For second-level authentication, the user can set a password based on
color combinations through RGB button combinations.
• To set the third-level authentication, the user will need to upload
their desired image into the system.
• To log in, the user will need to enter their email and password. Then
they would need to choose the RGB combination password and at the
last, they would need to choose the correct pattern or combination of
the image, from the top-left arrangement, from the jumbled puzzle.
ADVANTAGES
• The system is easy to maintain.
• It is user-friendly.
• The system is user-friendly and has a simple interface.
• Provides strong security against bot attacks or hackers.
• Users can set or upload their own images.
• Protects systems vulnerable to attacks.
SYSTEM DESCRIPTION
The system comprises 2 major modules with their sub-modules as follows:
• REGISTER: • LOGIN:
• The user can register by adding • To log in, the user would need to
details & entering a conventional enter their email & password.
alphanumeric password. • For the second level, they would
• For second-level authentication, need to choose the RGB combination
they can set passwords based on password.
colour combinations through RGB • For the third level, they would need
button combinations. to choose the correct pattern or
• For third-level authentication, they combination of the image from the
can set an Image-based password top left arrangement, from the
where users can upload their jumbled puzzle.
desired image into the system.
PROJECTY CYCLE
• The waterfall model is a classical model
used in the system development life cycle to
create a system with a linear and sequential
approach. It is termed a waterfall because
the model develops systematically from one
phase to another in a downward fashion.
• The waterfall approach does not define the
process to go back to the previous phase to
handle changes in requirements. The
waterfall approach is the earliest approach
that was used for software development.
APPLICATIONS
• It can be used by individuals or over the internet to protect the
system.
• The system can be used in website registrations.
• to achieve the highest security in authenticating users