期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2015
卷号:6
期号:3
页码:167-170
语种:English
出版社:Ayushmaan Technologies
摘要:Keylogging is an activity to capture user keystrokes and records the activity of a computer user in a covert manner using keyboard logger hardware and software. Secretly monitors and keyloggers record all keystrokes. Unlike other malware, keyloggers cause any threat to the system. But it can be used to intercept passwords and other confidential information entered via the keyboard, residents are considering various rootkits on computers (PCs) that violates safety. Cybercriminals can get user names, email passwords, PIN codes, account numbers, email addresses, account passwords, online games, electronic payment systems, etc. As a result, it is seen as a user authentication for financial transactions. To preventkeylogging, strict authentication is required. The QR code can be used to design the visual authentication protocols to achieve high ease of use and safety. The two authentication protocols are One-Time-Password Authentication Protocol and time-based protocol based passwords. Through accurate analysis, protocols have proven robust authentication several attacks. And also for the deployment of these two protocols in real-world applications, especially in online transactions, the strict safety requirements can be met.