Professional Documents
Culture Documents
3 Methodologies
3 Methodologies
METHODOLOGY
3.1 Implementation
The Phenomena behind implementing such Ideas lies in the Method one tries to
approach. In our case, the Process is a Multi-factor Scheme meaning there are Multiple
Methods of Approach and Stages for every type of Authentication.
To understand the thought process that lies in these Authentication Techniques, Consider an
ATM (Automated Teller Machine). The default method of Authenticating a User and letting
him/her use the designated application further the System had to verify the Credentials
associated with the Bank Records to that of the User entered at the time of the Transaction.
For Instance, To Debit a Cash amount first the user has to Insert the Debit card and Enter the
PIN details and if verified successfully the Session will continue without any hassle and if
the wrong PIN is entered then the Session shall Terminate releasing the Card.
The Credibility of the User could not have been verified, As anyone with that Card and the
PIN could have accessed the Bank Transaction. So to address this issue the Working Strategy
reveals that these Transactions can only be performed under the vision of the User alone and
no one from elsewhere by Introducing the 3D Password (Three Dimensional Password)
Technique. Structuring the Levels of Authentication to Base, Intermediate and Advanced.
The Basic Level of Authentication could include Smart Cards, Debit Cards and Access Cards
that is used to Enter Authorized Premises at Work Places. Making sure that the User is using
his/her Designated Card.
The Second Phase is the Intermediate Level, this could be processed with the Password
entered by the User to that of the Passwords held in the Index System or the Unique
Identification Number stored under UIDAI.
The Advanced or the Third Level of Authentication shall use the Personal Data with respect
to their Bio-metrics, Iris and Face Recognition. So this makes any kind of Transaction or
Entry legit and Fool Proof System.
3.1.3 Applications
The Proposed Technology is not just meant for theory and Research but is also usable by
every Individual in day-to-day life.
• PC Login
• Electronically maintained Door
• Biometric Attendance System
3.2 Demonstration
The Following is an Instance of Logging in as a User into the Microsoft Account page using
a PC with an in-built Finger Print Scanner.
Although there exists a saved Password linked to the Mail Address the System validates the
Fingerprint of the User to make sure that the session is carried out by an Authentic User.
Fig.3.5 White LED beside the Fingerprint Reader blinking to show it was Successful
Picture 3.8 depicts Level 1 Phases of Scrutiny by asking the User to Insert a Debit Card and
In the background Cross verifies If the Inserted Card is Registered under an Account Holder
or If it is a Faulty one. Picture 3.9 Obtains the Choice of Mode as to verify the credibility of
the User by either a Four or Six-digit PIN or by Biometric Fingerprint.
Fig.3.10 Prompt to verify the UID Fig.3.11 Requesting for Fingerprint recognition
Picture 3.10 Shows a Prompt over the Screen asking the Account Holder to verify their UID
i.e. The Unique Identification Number also known as the Aadhar Number that is linked
across the Data Index System of India, which is relatively linked to PAN – Permanent
Account Number with the Bank Account Credentials. This Phase acts as a 2D Layer.
Picture 3.11 depicts the Machine is ready for Fingerprint Recognition of the Account Holder
and this is the Final Phase of Scrutiny where the Fingerprint Reader examines If the Scanned
Biometrics match to that of the Records maintained in the Index System.
Fig. 3.12 Fingerprint Recognition in Progress Fig. 3.13 Entering the Withdrawal Amount
Picture 3.12 Shows that the Account Holder is Placing the Left Thumb Finger against the
Reader as it is considered to be the most Unique Fingerprint that could be obtained in Human
Biometrics. This shall now validate and if found true it will go further, if not it will Terminate
the Session by throwing a Warning Message saying that the Biometrics didn’t match the
Records.
Picture 3.13 Prompts the Account Holder after successful Authentication of all Three Phases
of Scrutiny to Enter the Amount he/she would wish to Withdraw from the Account.
Fig. 3.14 System Processing the Transaction Fig. 3.15 Cash is Dispensed by the ATM
Picture 3.14 Screen Shows the System Processing the Transaction in the Background and
Picture 3.15 depicts Cash being dispensed by the Automated Teller Machine. This turning
out to be a Successful Transaction Authenticated by 3D Password.