Advanced Authentication System: A Secure Authentication Methodology Incorporating Face and Text Passwords, Image Password Grids, Sensitive Information Retrieval, and Login Activity Tracking with Efficient Database Connection

Authors

  • Kambhamtati Sudhakar Associate Professor, Department of Information Technology, Vishnu Institute of Technology, Bhimavaram, India
  • Namburi Pavan Kumar Raju Student, Department of Information Technology, Vishnu Institute of Technology, Bhimavaram, India
  • Vegulla Praveen Student, Department of Information Technology, Vishnu Institute of Technology, Bhimavaram, India
  • Mulugurthi Hithin Student, Department of Information Technology, Vishnu Institute of Technology, Bhimavaram, India

Keywords:

identity verification system, safe login, login activity, online threats, facial recognition, voice authentication, fingerprint scanning

Abstract

We have implemented a new identity verification system. These methods include answering questions about yourself, selecting images from a grid, using your words and face as passwords, and keeping track of when and how you log in. We want to be sure that nobody else has access to your account but you. We employ multiple methods to verify your identity since they are more difficult to compromise than a single method. Additionally, we store and use your information using secure, quick connections. Our goal is to make logging in for you as simple, quick, and safe as possible. We believe that our system is superior to the current ones in use.

Downloads

Download data is not yet available.

Downloads

Published

23-02-2024

Issue

Section

Articles

How to Cite

[1]
K. Sudhakar, N. P. K. Raju, V. Praveen, and M. Hithin, “Advanced Authentication System: A Secure Authentication Methodology Incorporating Face and Text Passwords, Image Password Grids, Sensitive Information Retrieval, and Login Activity Tracking with Efficient Database Connection”, IJRESM, vol. 7, no. 2, pp. 89–94, Feb. 2024, Accessed: Dec. 22, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2944