Using Mobile-OTP And Qr Code In Online Banking Authentication System Case Study

Great Essays
Abstract— The focus of this paper is to use Mobile-OTP and QR code in online banking authentication system to provide the best hacker security. Recently, personal information has been leaked through a high degree of methods, such as phishing or pharmacy, to capture user IDs and passwords. This will result in an inappropriate ID / password being propagated between different users; thus a secure user authentication system is essential. In this paper, we use a different technology to provide a secure and easy to use new online banking authentication system Keyword- , OTP, QR code, Android,. I. INTRODUCTION Internet banking is one of the most sensitive tasks that general Internet users perform. Most traditional banks offer online banking and 100% …show more content…
Android was originally developed by Android, Google financially supported and purchased Android in 2005. Beginning Android runs on Linux Kernal version 2.6, starting with the Android 4.0 operating system version, with version 3.x and libraries and APIs. III LITERATURE SURVEY In this survey, we are reading how to develop two software’s for online banking system which provides more security to bank customer. First one is android based mobile software which will scan the QR code generated by bank server. We are developing software that provides E-banking facility. At first, Bank customers have to do registration and create his account.  Next step is normal login step in that customer have to provide username and password for login process.  Based on customer id, current system time and Random number (3 parameters) OTP1 is generated that is hide inside QR code image.  QR code image is generated by three parameters OTP1,image size and image format.  QR code image is displayed on computer screen (bank server).  Permutation combination logic is applied on OTP1 + IMEI number (of customer’s …show more content…
VII Security In this proposed work security purpose is most important, if the user’s scan the QR Code and the QRCode is mismatch then the account is blocked and entire account is again activated by bank. VIII Conclusion In this paper, we propose a new online banking authentication system that can provide greater security and convenience through the use of mobile OTP with QR codes, one of the current international and national standards for the use of 2D barcodes. In our project, we will not use previous technology, because the network is not available, then the OTP does not work after the completion of the transaction. References 1) YoungeSil Lee, “Online Banking Authentication System”, Dongseo University, South Korea, 2010 2) Mohammad Mannan, P. C. Van Oorschot, “Security and Usability: TheGap in Real-World Online Banking”, North Conway, NH, USA, 2007. 3) Sang-Il Cho, HoonJae Lee, Hyo-Taek Lim, Sang-Gon Lee, “OTPAuthentication Protocol Using Stream Cipher with Clock-Counter”,October, 2009. 4) Jean-Daniel Aussel, “Smart Cards and Digital Identity”, Telektronikk3/4. 2007. ISSN 0085-

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    To develop this application I have choose ASP.NET MVC 5.0 as a Front End and SQL SERVER 2012 Express edition as a Backend. To work on this technologies we are using Visual studio 2013 web Express and SQL SERVER Management Studio 2012. 1.1 SELECTION CRITERIA There are various reason for choosing this  Responsive design possible  SEO optimization is easy  Easy to implement …

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It offers security by password technique for individual access, and protect against unauthenticated change and delicacy. High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever. Encourage interaction and communication through java and needs Browser capable of running JAVA programs.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    3. Use a Password Management Tool Phishing are made specially to gain usernames and passwords to steal sensitive or confidential information. The passwords management tool can be used to ease the staffs by changing their passwords after each important transactions and send messages for confirmation and their new and unique passwords. 4.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Biometric Analysis Paper

    • 791 Words
    • 4 Pages

    In the end, what may prove most useful is the mix of biometric methods. Sophisticated computer network attacks that increase human resource, maintenance and operation costs prompt the need for more advanced security techniques. Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks. Biometrics involves being able to compare objects and determining if there is a match. Biometric authentication captures an image and builds a template of the image to be used for future comparison.…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Bipolar Disorder Analysis

    • 193 Words
    • 1 Pages

    Bipolar Disorder is a well-known disease that occurs according to a person’s mood from high to low. The mood swings happen at constant intervals depending on the fluctuating levels of the person’s energy and sleep. “One person in every 100 people have Bipolar Disorder” (Mental Health website). In this essay, I will be focusing on proposed idea related to e-Health that monitors the app usage of a Bipolar Disorder sufferer to determine their mood. The intension of the idea is to help improve the health and well-being of the patients who suffer from the depressive episodes.…

    • 193 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Healthcare facilities use a variety of methods to safeguard patient information from theft. Every facility implements the system that adapt to their necessities, they take into consideration that they have to protect the paper and electronic information. Some of the security measures that can be implemented are: 1. Increase administrative control: this step can be achieved by updating the security policies and procedures; training employees in privacy and security; and keep updated background checks on employees that have access to patient information. 2.…

    • 261 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This project is a milestone in easing the life of the clients. This project overcomes the frustrations in waiting for one's turn in a long queue. The use of mobile phones was established and it was a whole new factor in the communications access mode. This was proved correct based on the test conducted by the researcher in the UNO-R accounting office.…

    • 598 Words
    • 3 Pages
    Improved Essays