Table of Contents
Recommendation i
Dissertation Approval Sheet ii
Certificate iii
Acknowledgements iv
Abstract v
List of Figure ix
List of Tables x
CHAPTER 1: INTRODUCTION 1
1.1 Overview 2
1.2 Problem definition 3
1.3 Proposed solution 4
1.4 Scope of project 5
CHAPTER 2: LITERATURE SURVEY 10
2.1 Concept & Theory 10
2.2 Technologies used 12
2.3 Tools used 16
2.4 Other requirements
CHAPTER 3: REQUIREMENT GETHERING 19
3.1 Software Requirements 20
3.2 Hardware Requirements 23
vi
3.3 Data Dictionary 28
3.4 Identify Entities 29
3.5 Identify Task
CHAPTER 4:DESIGN 33
4.1 Use Case Model 33
4.2 Use Case Description 34
4.3 Activity Diagram 35
4.4 Sequence Diagram 37
4.5 Class Diagram
4.6 E R Diagram
4.7 Data Flow Diagram
CHAPTER 5: IMPLEMENTATION & TESTING 40
5.1 Implementation 40
5.2 Testing Strategy adopted 42
CHAPTER 6: CONCLUSION 43
6.1 Conclusion 43
6.2 Limitation of Project 44
6.3 Future enhancement
Appendix A 45
vii
Screenshot
Appendix B:
Bibliography
Appendix C:
Glossary Appendix
References 52
viii
List of Figures
Figure 3.1: Security architecture for strong authentication 21
Figure 3.2: Strong Authentication using Mobile phone 22
Figure 3.3: Password Algorithm 23
Figure 3.4: Layered Architecture 25
Figure 3.5: Hybrid Architecture 26
Figure 3.6: Basic Association 27
Figure 3.7: Authentication Association 27
Figure 3.8: Cryptography and Authentication Association 27
Figure 3.9: Authentications and Access Control Association 28
Figure A1: Login Page 39
Figure A2: Dynamic Password 39
Figure A3: Password Algorithm 40
Figure A4: Duplicity Result 40
Figure A5: Forget User name & Password 41
Figure A6: Sampled Dynamic Password 41
ix
x