dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.advisor | Anwar, Md. Tawhid | |
dc.contributor.author | Hossain, Mohammad Naveed | |
dc.contributor.author | Zaman, Sheikh Fahim Uz | |
dc.contributor.author | Khan, Tazria Zerin | |
dc.contributor.author | Katha, Sumaiya Azad | |
dc.date.accessioned | 2022-05-18T05:22:24Z | |
dc.date.available | 2022-05-18T05:22:24Z | |
dc.date.copyright | 2022 | |
dc.date.issued | 2022-01 | |
dc.identifier.other | ID 17201018 | |
dc.identifier.other | ID 18101597 | |
dc.identifier.other | ID 18101477 | |
dc.identifier.other | ID 18101447 | |
dc.identifier.uri | http://hdl.handle.net/10361/16636 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 31-32). | |
dc.description.abstract | We live in a technological era where technology controls our lives in a good way or in a
bad way. In today’s digital world we cannot imagine a single day without technology
and for security for purposes we mostly rely on single-factor authentication or two
factor authentication. While using two factor authentication (2FA) our data can
still be hacked. 2FA has some weaknesses and for That is the reason our password
can be easily cracked or hacked by hackers, even when hackers do not have our
OTP. To solve this weakness and make our data more secure and reliable we use
three factor authentication so that any unauthorized person cannot easily access our
data. We use 5 steps with 3 authentications. First one is username and password
after verification, second one is OTP and if both are verified, the last and third one
is bio-metric such as fingerprint, voice recognition etc. but not every device supports
the bio-metric system for those devices graphical password can be used. Through
these three authentications we can protect our data, make it secure and trustworthy
for every user. | en_US |
dc.description.statementofresponsibility | Mohammad Naveed Hossain | |
dc.description.statementofresponsibility | Sheikh Fahim Uz Zaman | |
dc.description.statementofresponsibility | Tazria Zerin Khan | |
dc.description.statementofresponsibility | Sumaiya Azad Katha | |
dc.format.extent | 32 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | OTP | en_US |
dc.subject | Authentication | en_US |
dc.subject | 2FA | en_US |
dc.subject | Hacked | en_US |
dc.subject | Bio-Metric | en_US |
dc.subject.lcsh | Computers ; Access control ; Passwords. | |
dc.title | A generic framework of three factor authentication with optional bio-metric or graphical password | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B. Computer Science | |