Article Details

“Introduction and Limitation of 2 Wmas” |

Inderpal Singh Oberoi, in International Journal of Information Technology and Management | IT & Management


Even though manyorganizations still rely on static ID and password authentication system, thismethod is getting old and there is a requirement for a better way ofauthentication which is required. One of the solutions for this issue is thetwo factor authentication technique as a fundamental security function. Ourdissertation proposal explores the two factor authentication technique andimplementation issues which can be used for the two factor authenticationtechnique. We implement Two-factor authentication method in two main phases. Inthe first phase, the authenticator gets a request generated by the applicationto authenticate a specified user. When the request is received, it generates aone-time password and sends it through a SMS to a GSM cell phone registered forthat specified user.