100% found this document useful (1 vote)
1K views

E-Authentication Using QR Code and OTP

This document discusses using QR codes and one-time passwords (OTP) for electronic authentication. It describes how QR codes store data that can be accessed instantly, and how OTPs are automatically generated strings that authenticate a single transaction. The proposed system would have users register with basic details, then login and be sent a QR code or OTP for verification. If verified, the user would access the main page. Benefits include more secure login without complex passwords, while drawbacks require an internet connection.

Uploaded by

Anusha Giri
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

E-Authentication Using QR Code and OTP

This document discusses using QR codes and one-time passwords (OTP) for electronic authentication. It describes how QR codes store data that can be accessed instantly, and how OTPs are automatically generated strings that authenticate a single transaction. The proposed system would have users register with basic details, then login and be sent a QR code or OTP for verification. If verified, the user would access the main page. Benefits include more secure login without complex passwords, while drawbacks require an internet connection.

Uploaded by

Anusha Giri
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

E-Authentication using QR

code and OTP


Electronic Authentication
• A process used to verify someone's identity by electronic means for the
purpose of allowing access to electronic accounts and other information.
• It is the process of establishing confidence in user identities electronically
presented to an information system.
• E-authentication methods: OTP,QR code , biometrics
QR Code

• A QR code is a type of barcode that can be read easily by a digital device


and which stores information as a series of pixels in a square-shaped grid.
• QR stands for "Quick Response.“
• QR codes are capable of storing lots of data. But no matter how much data
they contain, when scanned, the QR code allows the user to access
information instantly – hence why it’s called a Quick Response code.
OTP
• OTP stands for one time password
• It is an automatically generated numeric or alphanumeric string of
characters that authenticates a user for a single transaction or login
session.
• The OTP values have minute or second timestamps for greater security.
• The one-time password can be delivered to a user through several
channels, including an SMS-based text message, an email ,etc
Modules:
• Registration:
- To access the system, user need to first register by entering the basic registration
details like name, email id, mobile number, gender, etc.
• Login:
- Here, user need to enter the login credentials to access the system.
- If the login credentials are validated by the system, the page will be redirected to
user authentication page where user need to select any one authentication type as
OTP or QR Code.
 
• OTP Verification:
- If user select’s OTP authentication, then system will send an OTP in the form of
SMS on the registered mobile number which was provided by the user at the time
of registration
• Scan QR Code:
- If user select’s QR code, then code is generated in backend and sent on the user’s
email id.
- User need to scan the QR Code using system webcam to validate the QR Code
sent over the mail.
 
 
• Main Page Access:
- If the user passes the authentication process, then the page will be redirected to
Main Page else, it will redirect to login page.
Advantages and Disadvantages

Advantages Disadvantages
• Helps users to login into their account more • Requires an active internet
securely.
connection
• Stalker won’t be able to collect the
password via shoulder surfing.
• Complex password technique with easy user
interface.
Advantages and Disadvantages

Advantages Disadvantages
• Helps users to login into their account more • Requires an active internet
securely.
connection
• Stalker won’t be able to collect the
password via shoulder surfing.
• Complex password technique with easy user
interface.
Thank you

You might also like