Main Article Content
Abstract
The emerging threats to user privacy over the internet are increasing at an alarming rate. Signing-in from an unreliable terminal into a web account may result in compromising private details of a user such as username and password, by means of keylogger software. Such software are capable of recording keystrokes secretly, via covert channels without the knowledge of the user. In this paper we propose a secure method for signing in using Quick Response (QR) codes with mobile authentication. Through this method, the user can securely sign-in into a web account by authenticating the user session on an unreliable terminal browser, using a mobile device.
Keywords
Access tokens
Asymmetric key cryptography
CAPTCHA
Login authentication
QR code
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of 
How to Cite
Adhatrao, K., Gaykar, A., Jha, R., & Honrao, V. (2015). A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION. Students’ Research in Technology & Management, 1(1), 01-11. Retrieved from https://giapjournals.com/ijsrtm/article/view/37
References
- Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the
- ACM, 43(2), p. 91- 98. DOI 10.1145/328236.328110.
- Advantages and disadvantages of Biometrics,
- http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%
- technologies
- Keylogger, http://www.webopedia.com/TERM/K/keylogger.html
- Shoulder surfing, http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
- Kumar, M., Garfinkel, T., Boneh, D., & Winograd, T. (2007). “Reducing Shoulder-surfing by
- Using Gaze-based Password Entry”
- Disadvantages and advantages of Biometrics,
- http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics
- Dictionary attack, http://searchsecurity.techtarget.com/definition/dictionary-attack
- CAPTCHA, http://www.captcha.net/
- SHA-1 function in PHP, http://php.net/manual/en/function.sha1.php
- About QR codes, http://www.qrcode.com/en/aboutqr.html
- “Global Growth in Mobile Barcode Usage - Q4 / 2010", 3GVision, 5 January 2011.
- jQuery, http://jquery.com/
- What is PHP, http://php.net/manual/en/intro-whatis.php
- What is MySQL, http://dev.mysql.com/doc/refman/4.1/en/what-is-mysql.html
- Android SDK, http://developer.android.com/sdk/index.html