SlideShare une entreprise Scribd logo
1  sur  21
SECURED QR CODE
 PANKAJ JESWANI
INTRODUCTION
• QRCodes which Encode AES Encrypted user Information with One
Time Password.
• Similarities and differences between the QRLogin systems and
traditional OTP systems.
• Developments within two factor identification systems are
significantly increasing the application of security systems to
protect personal information.
• Our implementation is about new authentication scheme for secure
OTP distribution in net banking through QR codes.
INTRODUCTON
Problem Definition
• To avoid remembering username and password and also to ease
online transactions, QRLogin is developed.
• The main aim is to provide secured login systems which also
perform online transactions. The QRLogin includes 2D barcode
‘QRCode’ which consists of encrypted user information with time-
sensitive One Time Password (OTP) by using well known
Asymmetric Encrypted Standard (AES) algorithm.
• The objective of our project is to come up with banking website and
online shopping website that implement and demonstrates how QR
Code can be used with Encryption algorithms to ensure data
security as it provides dual security with data optimization.
INTRODUCTON
Relevance of Project
• Our project “Secured QRCode” includes Encryption which changes
data or information that is normally plaintext through the usage of
an algorithm so that someone must possess certain knowledge to
access it.
• The bank can make Secured QR codes of Costumers which includes
confidential data such as user information and one time password.
This means people outside the bank cannot decode the Encrypted
QR code without unique key.
INTRODUCTION
Scope of the Project
• QRLogin system revolutionizes web site login and
authentication. It eliminates many problems inherent in
traditional login techniques.
• It is more secure as it involves AES encryption technique and
it is easy to use also gives freedom from remembering so
many username and password for different websites.
• The simple and straightforward SECURED QRLogin system
yields a surprising array of features and benefits and can be
used in various applications like e-commerce, e-retail, e-
booking, e-learning and many more
BLOCK DIAGRAM
Encrypted QR-Code
Plain
OTP
+Key
AES
Algorithm
QR
Code
+Key
PHP
Plain
OTP
Encrypted
Text
KEY PROCESS
• Encryption & Decryption
• QR-Code Generation
• QR-Encoding
• Decoding
ENCRYPTION & DECRYPTION
• A message that is completely readable and is in no
way scrambled or disguised is called plaintext. Plaintext
is unencrypted data.
•Encryption is the process of scrambling or disguising
plaintext by applying a cryptographic algorithm to
produce cipher text.
•Cipher text is encrypted data.
•Decryption reverses the encryption process and turns
cipher text back into its original plaintext form
ENCRYPTION & DECRYPTION
QR CODE GENERATION
• To create a QR code, we need string of data in this case the
encrypted message.
• The method is discussed in details below:
• The Encrypted file, which is created using the method AES is
now treated as the input file and the string is extracted from
the file to generate the QR Code.
• Step 1: call function file_read(output_file)
• Step 2: call function generate_QRCode( str[] )
QR CODE DECODING
• We here follow the reverse process of the above generateQRCode()
Algorithm to detect the QR Code Image using Library Class and get
back the encrypted message.
Design Approach
• PHP
• YII Framework
• XAMPP
PHP (Hypertext Pre-Processor)
 PHP is a scripting language designed to fill the gap
between SSI (Server Side Includes) and Perl, intended for the
web environment. Its principal application is the
implementation of web pages having dynamic content.
 PHP is currently divided into two major versions: PHP 4 and
PHP5 , although PHP 4 is deprecated and is no longer
developed or supplied with critical bug fixes. PHP 6 is
currently under development.
YII(Yes It Is)
• Yii is an open source, object-oriented, component-based MVC PHP web
application framework. Yii is pronounced as "Yee" and it's an acronym for “Yes
It Is!”
XAMPP
• XAMPP is a free and open source cross-platform web server
solution stack package, consisting mainly of the Apache HTTP
Server, MySQL database, and interpreters for scripts written in
the PHP and Perl programming languages.
DEMONSTRATION
• Shopping Cart [Whole Demonstration]
• QR Code Auth System [QR Login System]
• QR Decoding [Decoder]
CONCLUSION
•  In our project “Secured QRCode” we have proposed a secure and
reliable authentication scheme for net-banking through QR code
based OTPs. In recent years there has been a steep increase in the
number of net-banking users.
• Hence the proposed system satisfies the high security requirements
of the online us and protects them against various security attacks.
Also the system does not require any technical pre-requisite and
this makes it very user-friendly.
• Hence QR code proves to be versatile at the same time beneficial
for both the customers in terms of security and vendors in terms of
increasing their efficiency. Hence it is most widely used to advertise
and market the products by most businesses.
CONCLUSION
• In future, we will like to enhance our project by creating an android
application which will be used as way of retrieving OTP by just
scanning a QRCode.
• It will be more easier and at the tip of the user’s fingers as all the
bank transactions will be done by Smartphone which will save users
time and will be more secure than traditional transaction system.
REFERENCE
Reference
Thanks
Vishal Chhabria
Sagar Chawla
Pankaj Jeswani
For your valuable time and attention!
From Secure QR-Code Team

Contenu connexe

Tendances

BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMKeerthi Keerthi
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingSavitaHanchinal
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationDhvani Shah
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Currency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABCurrency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABthahani kunju
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)Rohan Sawant
 
QR Code - Quick Response Code
QR Code - Quick Response CodeQR Code - Quick Response Code
QR Code - Quick Response CodeAditya Vishnu
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 

Tendances (20)

BUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEMBUS PASS MANAGEMENT SYSTEM
BUS PASS MANAGEMENT SYSTEM
 
Sign verification
Sign verificationSign verification
Sign verification
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Qr codes
Qr codesQr codes
Qr codes
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Currency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABCurrency recognition using image processing in MATLAB
Currency recognition using image processing in MATLAB
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Qr code (quick response code)
Qr code (quick response code)Qr code (quick response code)
Qr code (quick response code)
 
QR Code - Quick Response Code
QR Code - Quick Response CodeQR Code - Quick Response Code
QR Code - Quick Response Code
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 

En vedette

Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingSnehith
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code paymentJames Wu
 
QR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentQR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentMahindra Comviva
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
20 Interesting Things: QR Codes
20 Interesting Things: QR Codes20 Interesting Things: QR Codes
20 Interesting Things: QR CodesDavid Stutts
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Steve Werby
 
1 architecture & design
1   architecture & design1   architecture & design
1 architecture & designMark Swarbrick
 
Ett 530 clark final_project qr code numbers
Ett 530 clark final_project qr code numbersEtt 530 clark final_project qr code numbers
Ett 530 clark final_project qr code numbersNicole Clark
 
QR Code Mashups for Everyone
QR Code Mashups for EveryoneQR Code Mashups for Everyone
QR Code Mashups for EveryoneBert Heymans
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing Hasini Weerathunge
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & ProfitRun2LIVE, Inc.
 
E-Commerce Basics
E-Commerce BasicsE-Commerce Basics
E-Commerce BasicsAl Muzahid
 
FPT University - Capstone project - Using QR Code to prevent fake products
FPT University - Capstone project - Using QR Code to prevent fake productsFPT University - Capstone project - Using QR Code to prevent fake products
FPT University - Capstone project - Using QR Code to prevent fake productsLe Kien Truc
 
Creating a Global E-Commerce Website With E-Business Suite and Fusion Middleware
Creating a Global E-Commerce Website With E-Business Suite and Fusion MiddlewareCreating a Global E-Commerce Website With E-Business Suite and Fusion Middleware
Creating a Global E-Commerce Website With E-Business Suite and Fusion MiddlewareBrian Huff
 

En vedette (20)

Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 
Secure QR code payment
Secure QR code paymentSecure QR code payment
Secure QR code payment
 
QR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless paymentQR Code Based Payment- The most advanced contactless payment
QR Code Based Payment- The most advanced contactless payment
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
20 Interesting Things: QR Codes
20 Interesting Things: QR Codes20 Interesting Things: QR Codes
20 Interesting Things: QR Codes
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
Qrcodes
QrcodesQrcodes
Qrcodes
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
1 architecture & design
1   architecture & design1   architecture & design
1 architecture & design
 
OpenStack at PayPal
OpenStack at PayPalOpenStack at PayPal
OpenStack at PayPal
 
QR Week Project
QR Week ProjectQR Week Project
QR Week Project
 
Ett 530 clark final_project qr code numbers
Ett 530 clark final_project qr code numbersEtt 530 clark final_project qr code numbers
Ett 530 clark final_project qr code numbers
 
QR Code Mashups for Everyone
QR Code Mashups for EveryoneQR Code Mashups for Everyone
QR Code Mashups for Everyone
 
CS4099Report
CS4099ReportCS4099Report
CS4099Report
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing
 
QR Codes for Fun & Profit
QR Codes for Fun & ProfitQR Codes for Fun & Profit
QR Codes for Fun & Profit
 
E-Commerce Basics
E-Commerce BasicsE-Commerce Basics
E-Commerce Basics
 
FPT University - Capstone project - Using QR Code to prevent fake products
FPT University - Capstone project - Using QR Code to prevent fake productsFPT University - Capstone project - Using QR Code to prevent fake products
FPT University - Capstone project - Using QR Code to prevent fake products
 
Creating a Global E-Commerce Website With E-Business Suite and Fusion Middleware
Creating a Global E-Commerce Website With E-Business Suite and Fusion MiddlewareCreating a Global E-Commerce Website With E-Business Suite and Fusion Middleware
Creating a Global E-Commerce Website With E-Business Suite and Fusion Middleware
 

Similaire à Secured qr code [Pankaj Jeswani and Team]

Qr Codes 101
Qr Codes 101Qr Codes 101
Qr Codes 101Maestro
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxlior mazor
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric keymdhar123
 
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Amazon Web Services
 
Blockchain Programming.pptx
Blockchain Programming.pptxBlockchain Programming.pptx
Blockchain Programming.pptxNickjohn33
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAMSagara Gunathunga
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATUREProfesia Srl, Lynx Group
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...IRJET Journal
 
Microservices Security Patterns & Protocols with Spring & PCF
Microservices Security Patterns & Protocols with Spring & PCFMicroservices Security Patterns & Protocols with Spring & PCF
Microservices Security Patterns & Protocols with Spring & PCFVMware Tanzu
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC securityShiu-Fun Poon
 
Quality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionQuality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionMaitrikpaida
 
Quality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionQuality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionCygnet Infotech
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best PracticeShiu-Fun Poon
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 

Similaire à Secured qr code [Pankaj Jeswani and Team] (20)

PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Qr Codes 101
Qr Codes 101Qr Codes 101
Qr Codes 101
 
Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptxThe Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Blockchain Programming.pptx
Blockchain Programming.pptxBlockchain Programming.pptx
Blockchain Programming.pptx
 
581 517-525
581 517-525581 517-525
581 517-525
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAM
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
Microservices Security Patterns & Protocols with Spring & PCF
Microservices Security Patterns & Protocols with Spring & PCFMicroservices Security Patterns & Protocols with Spring & PCF
Microservices Security Patterns & Protocols with Spring & PCF
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
Quality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionQuality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solution
 
Quality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solutionQuality assurance-for-a-blockchain-based-solution
Quality assurance-for-a-blockchain-based-solution
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Secured qr code [Pankaj Jeswani and Team]

  • 1. SECURED QR CODE  PANKAJ JESWANI
  • 2. INTRODUCTION • QRCodes which Encode AES Encrypted user Information with One Time Password. • Similarities and differences between the QRLogin systems and traditional OTP systems. • Developments within two factor identification systems are significantly increasing the application of security systems to protect personal information. • Our implementation is about new authentication scheme for secure OTP distribution in net banking through QR codes.
  • 3. INTRODUCTON Problem Definition • To avoid remembering username and password and also to ease online transactions, QRLogin is developed. • The main aim is to provide secured login systems which also perform online transactions. The QRLogin includes 2D barcode ‘QRCode’ which consists of encrypted user information with time- sensitive One Time Password (OTP) by using well known Asymmetric Encrypted Standard (AES) algorithm. • The objective of our project is to come up with banking website and online shopping website that implement and demonstrates how QR Code can be used with Encryption algorithms to ensure data security as it provides dual security with data optimization.
  • 4. INTRODUCTON Relevance of Project • Our project “Secured QRCode” includes Encryption which changes data or information that is normally plaintext through the usage of an algorithm so that someone must possess certain knowledge to access it. • The bank can make Secured QR codes of Costumers which includes confidential data such as user information and one time password. This means people outside the bank cannot decode the Encrypted QR code without unique key.
  • 5. INTRODUCTION Scope of the Project • QRLogin system revolutionizes web site login and authentication. It eliminates many problems inherent in traditional login techniques. • It is more secure as it involves AES encryption technique and it is easy to use also gives freedom from remembering so many username and password for different websites. • The simple and straightforward SECURED QRLogin system yields a surprising array of features and benefits and can be used in various applications like e-commerce, e-retail, e- booking, e-learning and many more
  • 7. KEY PROCESS • Encryption & Decryption • QR-Code Generation • QR-Encoding • Decoding
  • 8. ENCRYPTION & DECRYPTION • A message that is completely readable and is in no way scrambled or disguised is called plaintext. Plaintext is unencrypted data. •Encryption is the process of scrambling or disguising plaintext by applying a cryptographic algorithm to produce cipher text. •Cipher text is encrypted data. •Decryption reverses the encryption process and turns cipher text back into its original plaintext form
  • 10. QR CODE GENERATION • To create a QR code, we need string of data in this case the encrypted message. • The method is discussed in details below: • The Encrypted file, which is created using the method AES is now treated as the input file and the string is extracted from the file to generate the QR Code. • Step 1: call function file_read(output_file) • Step 2: call function generate_QRCode( str[] )
  • 11. QR CODE DECODING • We here follow the reverse process of the above generateQRCode() Algorithm to detect the QR Code Image using Library Class and get back the encrypted message.
  • 12. Design Approach • PHP • YII Framework • XAMPP
  • 13. PHP (Hypertext Pre-Processor)  PHP is a scripting language designed to fill the gap between SSI (Server Side Includes) and Perl, intended for the web environment. Its principal application is the implementation of web pages having dynamic content.  PHP is currently divided into two major versions: PHP 4 and PHP5 , although PHP 4 is deprecated and is no longer developed or supplied with critical bug fixes. PHP 6 is currently under development.
  • 14. YII(Yes It Is) • Yii is an open source, object-oriented, component-based MVC PHP web application framework. Yii is pronounced as "Yee" and it's an acronym for “Yes It Is!”
  • 15. XAMPP • XAMPP is a free and open source cross-platform web server solution stack package, consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for scripts written in the PHP and Perl programming languages.
  • 16. DEMONSTRATION • Shopping Cart [Whole Demonstration] • QR Code Auth System [QR Login System] • QR Decoding [Decoder]
  • 17. CONCLUSION •  In our project “Secured QRCode” we have proposed a secure and reliable authentication scheme for net-banking through QR code based OTPs. In recent years there has been a steep increase in the number of net-banking users. • Hence the proposed system satisfies the high security requirements of the online us and protects them against various security attacks. Also the system does not require any technical pre-requisite and this makes it very user-friendly. • Hence QR code proves to be versatile at the same time beneficial for both the customers in terms of security and vendors in terms of increasing their efficiency. Hence it is most widely used to advertise and market the products by most businesses.
  • 18. CONCLUSION • In future, we will like to enhance our project by creating an android application which will be used as way of retrieving OTP by just scanning a QRCode. • It will be more easier and at the tip of the user’s fingers as all the bank transactions will be done by Smartphone which will save users time and will be more secure than traditional transaction system.
  • 21. Thanks Vishal Chhabria Sagar Chawla Pankaj Jeswani For your valuable time and attention! From Secure QR-Code Team