Professional Documents
Culture Documents
<Project>
Prepared by <author>
<organization>
<date created>
Table of Contents
Table of Contents...........................................................................................................................ii
Revision History.............................................................................................................................ii
1. Introduction..............................................................................................................................1
1.1 Purpose...........................................................................................................................................1
1.2 Document Conventions..................................................................................................................1
1.3 Intended Audience and Reading Suggestions.................................................................................1
1.4 Product Scope.................................................................................................................................1
1.5 References.......................................................................................................................................1
2. Overall Description..................................................................................................................2
2.1 Product Perspective........................................................................................................................2
2.2 Product Functions...........................................................................................................................2
2.3 User Classes and Characteristics.....................................................................................................2
2.4 Operating Environment...................................................................................................................2
2.5 Design and Implementation Constraints.........................................................................................2
2.6 User Documentation.......................................................................................................................2
2.7 Assumptions and Dependencies......................................................................................................3
3. External Interface Requirements...........................................................................................3
3.1 User Interfaces................................................................................................................................3
3.2 Hardware Interfaces........................................................................................................................3
3.3 Software Interfaces.........................................................................................................................3
3.4 Communications Interfaces............................................................................................................3
4. System Features.......................................................................................................................4
4.1 System Feature 1............................................................................................................................4
4.2 System Feature 2 (and so on)..........................................................................................................4
5. Other Nonfunctional Requirements.......................................................................................4
5.1 Performance Requirements.............................................................................................................4
5.2 Safety Requirements.......................................................................................................................5
5.3 Security Requirements....................................................................................................................5
5.4 Software Quality Attributes............................................................................................................5
5.5 Business Rules................................................................................................................................5
6. Other Requirements................................................................................................................5
Appendix A: Glossary...................................................................................................................5
Appendix B: Analysis Models.......................................................................................................5
Appendix C: To Be Determined List...........................................................................................6
Revision History
Name Date Reason For Changes Version
1. Introduction
1.1 Purpose
Token based authentication uses tokens such as bank cards and smart cards. A user
without a token is unable to login. Biometric based authentication applies biometric
verification techniques such as fingerprints, face recognition, hand geometry, voice
recognition and other physiological or behavioral methods. The knowledge-based
authentication can be classified as recall based technique (textual passwords and one
time passwords) and recognition based technique (graphical passwords like image
ordering and color pixels). Knowledge based authentication can be classified as text-
based and picture-based passwords. Text-based password includes both static
password and dynamic password
1.5 References
<List any other documents or Web addresses to which this SRS refers. These may include user
interface style guides, contracts, standards, system requirements specifications, use case documents,
or a vision and scope document. Provide enough information so that the reader could access a copy
of each reference, including title, author, version number, date, and source or location.>
2. Overall Description
This authentication system validates user input before accessing the system with a
three-level password logins, in which the password difficulty increases with each
level. Users should be able to set their passwords in the registration phase. Users can
login to the system by entering correct passwords. The first step is registering new
users. The registration system requests user’s information and records data into a
database. Then, text-based authentication is used as level 1 security and which asks
the user for his/her username and password. In level 2 we use a 4-digit PIN to verify
the user. Colored pattern authentication is set up as the level 3 security.
The project is an authentication system that validates user for accessing the system
only when they have inputted correct passwords. The project involves three levels of
user authentication (it contains three logins). The password difficulty increases with
each level. Users must input correct password for successful login within a time limit.
Users would be given privilege to set passwords according to their wish.
Text based authentication is going to be used as level 1 security and which asks
users for their username and password.
Image-based authentication is set up as level 2 security. It works as an
alternative click based graphical password scheme in which users are asked to
select three click points on an image uploaded by users. If users forget the
password then the system would pick another image from the registered
images.
Level 3 security uses a one-time password authentication that is applied by
generating a onetime random code
This Three level Password Authentication system was built as a C# Windows forms
application in Visual Studio 2010. Textboxes are used for users to enter information
to request access to the system. Colored patterns are implemented by using button-
lick function.
In optimizing access paths, frequent operations should not require many traversals. In
this case, verification is the most frequently invoked operation, which should have a
direct connection between the querying object and the queried object. Thus, each
verification process is directly connected to the corresponding database. Then objects
classes were collapsed into attributes, thus reducing the overall complexity of the
model. In the three-level password authentication system, FormSubmissionButton
and RegistrationControl can be collapsed into attributes of RegistrationForm class.
For mapping Associations to Collections, the authentication system uses
unidirectional one-to-one associations. Each user is associated with exactly one
userinfo object in the Database class. In verification process, the verification calls the
operations of the Database class, comparing the input with the corresponding user-
info
Design and Implementation Constraints
<Describe any items or issues that will limit the options available to the developers.
These might include: corporate or regulatory policies; hardware limitations (timing
requirements, memory requirements); interfaces to other applications; specific
technologies, tools, and databases to be used; parallel operations; language
requirements; communications protocols; security considerations; design conventions
or programming standards (for example, if the customer’s organization will be
responsible for maintaining the delivered software).>
This Three level Password Authentication system was built as a C# Windows forms
application in Visual Studio 2010.
Textboxes are used for users to enter information to request access to the system.
Colored patterns are implemented by using button-click function. In other words,
users should be able to log into the system by clicking the corresponding button that
they had registered. Otherwise, a “wrong password” message would be displayed.
Data is stored in an external text file using output file stream and it is retrieved by
using input file stream.
Class interfaces were identified and written in the following format:
User class (linked to FormSubmissionButton class)
username: String
password:String
-void setUername(String s);
-void setPassword(String s);
- String getUsername();
- String getPaasword();
The system uses optimizing access paths and collapsing objects into attributes
optimizations to simplify the Object Design Model.
In optimizing access paths, frequent operations should not require many traversals. In
this case, verification is the most frequently invoked operation, which should have a
direct connection between the querying object and the queried object. Thus, each
verification process is directly connected to the corresponding database. Then objects
classes were collapsed into attributes, thus reducing the overall complexity of the
model. In the three-level password authentication system, FormSubmissionButton
and RegistrationControl can be collapsed into attributes of RegistrationForm class.
For mapping Associations to Collections, the authentication system uses
unidirectional one-to-one associations. Each user is associated with exactly one
userinfo object in the Database class. In verification process, the verification calls the
operations of the Database class, comparing the input with the corresponding
userinfo.
3.4 Communications Interfaces
<Describe the requirements associated with any communications functions required by this product,
including e-mail, web browser, network server communications protocols, electronic forms, and so
on. Define any pertinent message formatting. Identify any communication standards that will be
used, such as FTP or HTTP. Specify any communication security or encryption issues, data transfer
rates, and synchronization mechanisms.>
4. System Features
<This template illustrates organizing the functional requirements for the product by system features,
the major services provided by the product. You may prefer to organize this section by use case,
mode of operation, user class, object class, functional hierarchy, or combinations of these, whatever
makes the most logical sense for your product.>
6. Other Requirements
<Define any other requirements not covered elsewhere in the SRS. This might include database
requirements, internationalization requirements, legal requirements, reuse objectives for the project,
and so on. Add any new sections that are pertinent to the project.>
Appendix A: Glossary
<Define all the terms necessary to properly interpret the SRS, including acronyms and
abbreviations. You may wish to build a separate glossary that spans multiple projects or the entire
organization, and just include terms specific to a single project in each SRS.>