Loading

Callback Authentication: A User Authentication Technique for Better Security
S. V. Patil1, M. M. Sutar2, P. R. Panari3, A. A. Magar4, G. S. Nakate5

1Mr. Suyog V. Patil, Assistant Professor in Department of Computer Science & Engineering, D. Y. Patil Technical Campus, Talsande, Kolhapur (Maharashtra), India.
2Mr. Milind M. Sutar, Department of Computer Science & Engineering, D. Y. Patil Technical Campus, Talsande, Kolhapur (Maharashtra), India.
3Miss. Pooja R. Panari, Department of Computer Science & Engineering, D. Y. Patil Technical Campus, Talsande, Kolhapur (Maharashtra), India.
4Mr. Avadhut A. Magar, Department of Computer Science & Engineering, D. Y. Patil Technical Campus, Talsande, Kolhapur (Maharashtra), India.
5Miss. Gouri S. Nakate, Department of Computer Science & Engineering, D. Y. Patil Technical Campus, Talsande, Kolhapur (Maharashtra), India.

Manuscript received on 15 April 2015 | Revised Manuscript received on 25 April 2015 | Manuscript Published on 30 April 2015 | PP: 126-128 | Volume-4 Issue-4, April 2015 | Retrieval Number: D3916044415/15©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: a user can get access to its account only by means of username and password in this sense the security of user account is only dependent on the password of user. Hence it is important that user should keep his/her password confidential. In many systems people select their username and text passwords when registering accounts on a website. The matter becomes worse when users would choose easy-to-remember passwords (i.e., weak passwords) even if they know the passwords might be unsafe. Therefore, it is important to take human factors into consideration when designing a user authentication protocol. In “callback authentication system” the user’s registered cell phone number has been efficiently used for user authentication.
Keywords: Call, Status, Authentication.

Scope of the Article: Big Data Security