0% found this document useful (0 votes)
14 views5 pages

Table of Content

Uploaded by

01abhishekwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Table of Content

Uploaded by

01abhishekwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Table of Contents

Recommendation i

Dissertation Approval Sheet ii

Certificate iii

Acknowledgements iv

Abstract v

List of Figure ix

List of Tables x

CHAPTER 1: INTRODUCTION 1

1.1 Overview 2

1.2 Problem definition 3

1.3 Proposed solution 4

1.4 Scope of project 5

CHAPTER 2: LITERATURE SURVEY 10

2.1 Concept & Theory 10

2.2 Technologies used 12

2.3 Tools used 16

2.4 Other requirements

CHAPTER 3: REQUIREMENT GETHERING 19

3.1 Software Requirements 20

3.2 Hardware Requirements 23


vi
3.3 Data Dictionary 28

3.4 Identify Entities 29

3.5 Identify Task

CHAPTER 4:DESIGN 33

4.1 Use Case Model 33

4.2 Use Case Description 34

4.3 Activity Diagram 35

4.4 Sequence Diagram 37

4.5 Class Diagram

4.6 E R Diagram

4.7 Data Flow Diagram

CHAPTER 5: IMPLEMENTATION & TESTING 40

5.1 Implementation 40

5.2 Testing Strategy adopted 42

CHAPTER 6: CONCLUSION 43

6.1 Conclusion 43

6.2 Limitation of Project 44

6.3 Future enhancement

Appendix A 45

vii
Screenshot

Appendix B:

Bibliography

Appendix C:

Glossary Appendix

References 52

viii
List of Figures
Figure 3.1: Security architecture for strong authentication 21

Figure 3.2: Strong Authentication using Mobile phone 22

Figure 3.3: Password Algorithm 23

Figure 3.4: Layered Architecture 25

Figure 3.5: Hybrid Architecture 26

Figure 3.6: Basic Association 27

Figure 3.7: Authentication Association 27

Figure 3.8: Cryptography and Authentication Association 27

Figure 3.9: Authentications and Access Control Association 28

Figure A1: Login Page 39

Figure A2: Dynamic Password 39

Figure A3: Password Algorithm 40

Figure A4: Duplicity Result 40

Figure A5: Forget User name & Password 41

Figure A6: Sampled Dynamic Password 41

ix
x

You might also like