Brinzel Rodrigues, Anita Chaudhari, Shraddha S. More
{"title":"使用qr码的两因素验证:Android智能手机用户的独特认证系统","authors":"Brinzel Rodrigues, Anita Chaudhari, Shraddha S. More","doi":"10.1109/IC3I.2016.7918008","DOIUrl":null,"url":null,"abstract":"The use of QR code-based technologies and systems has become a current trend in recent years where QR codes are acknowledged to be a practical and interesting data representation and processing mechanism amongst worldwide users. Our aim is to design and implement a two-factor identification authentication system with the use of QR codes and to make the relevant mechanism and process that could be more convenient for the user to use and practical than one time password (OTP) mechanisms used with similar intentions today. One time password (OTP) mechanisms are vulnerable since they can be compromised using man-in-the-middle attack, phishing, spoofing, etc. This system provides another level of security where QR code acts as the first factor and the android mobile acts as the second factor.","PeriodicalId":305971,"journal":{"name":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Two factor verification using QR-code: A unique authentication system for Android smartphone users\",\"authors\":\"Brinzel Rodrigues, Anita Chaudhari, Shraddha S. More\",\"doi\":\"10.1109/IC3I.2016.7918008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of QR code-based technologies and systems has become a current trend in recent years where QR codes are acknowledged to be a practical and interesting data representation and processing mechanism amongst worldwide users. Our aim is to design and implement a two-factor identification authentication system with the use of QR codes and to make the relevant mechanism and process that could be more convenient for the user to use and practical than one time password (OTP) mechanisms used with similar intentions today. One time password (OTP) mechanisms are vulnerable since they can be compromised using man-in-the-middle attack, phishing, spoofing, etc. This system provides another level of security where QR code acts as the first factor and the android mobile acts as the second factor.\",\"PeriodicalId\":305971,\"journal\":{\"name\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I.2016.7918008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I.2016.7918008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Two factor verification using QR-code: A unique authentication system for Android smartphone users
The use of QR code-based technologies and systems has become a current trend in recent years where QR codes are acknowledged to be a practical and interesting data representation and processing mechanism amongst worldwide users. Our aim is to design and implement a two-factor identification authentication system with the use of QR codes and to make the relevant mechanism and process that could be more convenient for the user to use and practical than one time password (OTP) mechanisms used with similar intentions today. One time password (OTP) mechanisms are vulnerable since they can be compromised using man-in-the-middle attack, phishing, spoofing, etc. This system provides another level of security where QR code acts as the first factor and the android mobile acts as the second factor.