The Automated System For General Administration Using QR Code
Keywords:
Keylogging; Authentication; QR Code; Two Protocals.Abstract
The keystroke logging is referred to as keylogging in which the steokes of keyboard are captured, which
means that the keys pressed on the keyboard are recorded. Except this the action of the person are observed and which
are unknown to the person. There are various kinds of rootkits which are present in PC's and the user behaviour is been
observed which make PC's untrusted device. When we need to focus on large network computer security is main subject
of concern. There are large number of keylog methods that rangesfrom hardware and software methods to acoustic
analysis. Fortunately there are preventive measures to search and destroy keyloggers or keep them at bay these we can
keep away ourself from malware attacks as well as shoulder suffering attacks we implemented sophisticated method for
security using QR code. Here we have demonstrated two protocols for visual authentication purpose which are term as
OTP based protocol and password based protocol. Here we show how visualization can improve security as well as
convenience by proposing two visual verification convention, one for password based authentication other one is one
time password.