INTER GROUP COMMUNICATION OF CUED CLICK POINTS
ABSTRACT
The project entitled as “Inter Group Communication of Cued Click Points ” is to design and
develop the application package for well secured dynamic application. This package is originated
using front end as ASP.NET, coding C#, Styles enforcing CSS, Validation applying JavaScript,
Derivate tidings in AJAX, Database with SQL Server. This package requires Visual Studio IDE
in the server for processing the WebPages and client systems requires Windows operating
system and one web browser like internet explorer.
In this project presents two components mainly Administration Management and User
Management. Access can be restricted to only those operates and perspectives that
Administrator. User Management is a substantiation feature that provides administrators with the
ability to identify and control the state of users logged into the network. This includes, but is not
limited to, the ability to query and filter users that are currently logged into the network,
manually log out users, and control user login counts and login times.
A click-based graphical password scheme called Cued Click Points (CCP) with endorses
biostatistics to increase the security and the remembrance of the password is discussed. In this
system a password consists of sequence of some images in which user can select one click-point
per image. In addition user is asked to redact their thumb visual aspect will be used to help the
user to login.
System showed very good Performance in terms of speed, accuracy, and ease of use. Users
preferred CCP to Pass Points, saying that selecting and remembering only one point per image
was easier in recalling the click points and biostatistics helps the user to enhance the security for
sharing files Arcanum.
MODULES
THIS PROJECT CONTAINS THE FOLLOWING MODULES
Administration management
User management
Create user indite vector
Create elucidated vector
Compare user indite/login vector
MODULE DESCRIPTION
Administration management:
Administrator owns the overall determination of controls, setting of major objectives, and the
identification of general purposes, guidance, leadership & control of the efforts of the groups
towards some common goals.
Admin has the privileges to update the text, and pictures . Admin also have the rights to restricts
the users and give the access justices to the user to register their details to access the login
account.
User management:
In this module user states the person should register their entropy, Graphical pictures and
biostatistics visual aspect. Access can be restricted to only those functions and views that
administrator.
User Management is a substantiation feature that provides administrators with the ability to
identify and control the state of users logged into the session. This includes, but is not limited to,
the ability to query and filter users that are currently logged in, manually log out users, and
control user login counts and login times.
Create user indict vector:
While registration of user information, the user id, or time and tolerance and biostatistics visual
aspect for creating master vector.
Master vector -
(User ID, frequency, Tolerance)
Create elucidated vector:
To create elucidated vector user has to select sequence of images and clicks on each image at
click points of his choice. indict vector is created.
Detailed Vector - (Image, Click Points)
Compare user indict/login vector:
Enters User ID and select time and biostatistics visual aspect which he want to be imprint at
login time, a tolerance value is also selected with will decide that the user is legitimate or an
imposter. Users preferred CCP to Pass Points, saying that selecting and remembering only one
point per image was easier in recalling the click points and biostatistics visual aspect helps the
user to enhance the security.
EXISTING SYSTEM:
In the existing system, Brostoff and sasse carried out an
empirical study of passfaces, which illustrates well how a graphical password
recognition system typically operates. Blonder-style passwords are based on cued
recall. A user clicks on several previously chosen locations in a single image to log
in. As implemented by Passlogix Corporation, the user chooses several predefined
regions in an image as his or her password. To log in the user has to click on the
same regions in effect, cued click points (ccp) is a proposed alternative to pass
points.
In ccp, users click one point on each of 5 images rather than on five points
on one image. It offers cued-recall and introduces visual cues that instantly alert
valid users if they have made a mistake when entering their latest click-point (at
which point they can cancel their attempt and retry from the beginning). It also
makes attacks based on hotspot analysis more challenging. Each click results in
showing a next-image, in Effect leading users down a “path” as they click on their
sequence of points. A wrong click leads down an incorrect path, with an explicit
indication of authentication failure only after the final click. Users can choose their
images only to the extent that their click-point dictates the next image.
While the predictability problem can be solved by disallowing user
choice and assigning passwords to users, this usually leads to usability issues since
users cannot easily remember such random passwords. Number of graphical
password systems have been developed, Study shows that text-based passwords
suffers with both security and usability problems.
Disadvantages:
The problem with this scheme is that the number of predefined regions is
small, perhaps a few dozens in a picture. The password may have to be up to
12 clicks for adequate security, again tedious for the user. Another problem
of this system is the need for the predefined regions to be readily
identifiable.
PROPOSED SYSTEM:
In the proposed work we have integrated sound signature to help in
recalling the password. No system has been devolved so far which uses sound
signature in graphical password authentication. Study says that sound signature or
tone can be used to recall facts like images, text etc. In daily life we see various
examples of recalling an object by the sound related to that object enters User ID
and select one sound frequency which he want to be played at login time, a
tolerance value is also selected with will decide that the user is legitimate or an
imposter. To create detailed vector user has to select sequence of images and clicks
on each image at click points of his choice. Profile vector is created.
SYSTEM SPECFICATION
HARDWARE SPECIFICATION
PROCESSOR : Intel Pentium IV 1.8 GHz
MOTHERBOARD : Intel 915GVSR chipset board
RAM : 2 GB DDR2 RAM
HARD DISK DRIVE : 325 GB
SPEED : 1GHZ
SOFTWARE SPECIFICATION
WEB SERVER : IIS SERVER
DOCUMENTATION : Microsoft word 2007.
CODING LANGUAGE : ASP.NET with C#
DATABASE : SQL Server 2008
TOOL : Silver light