Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{154584, author = {Sanjeevani Sanjiv Kamble and Harshada Sonkamble and Shriram Dashrath Mulimani and Sumeet Jaywant Sawant}, title = {Secure Banking System Using QR Code Authentication}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {8}, number = {11}, pages = {661-665}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=154584}, abstract = {This work is based on the design and implementation of a secure authentication method which utilizes a QR code an open source concept authentication system that uses a two-factor authentication by combining a password and a camera- equipped mobile phone, which acts as an authentication token. QR code is extremely secure as all the high- sensitive information is stored and transmitted and encrypted; however it is cost-efficient and easy to use. In this the QR code has a complex password which is stored. Smart Mobile phones are used for scanning the QR code. The code is scanned with the help of QR code scanner. Scanning generate the string which then combination of IMEI number of the phone which is register by the user. The random number is generated by the random number function. If the network is available on the smart phone then that generated string is automatically entered into the login page and homepage of bank. Otherwise six digit pin code is generated and it can be manually enter in the login page and home page of bank and then it is open for transactions. In a modern world where we are able to do almost everything on – line .Nowadays it is a matter of time were we are too able to access these services in the most secured manner. Indeed, as viruses and cracking methods become it is becoming more complex and powerful day by day, the available security techniques must improve as well as, allowing users to protect their data and communications with the maximum confidence. The aim is to develop an authentication method using a two factor authentication: a trusted device that will read a QR code and that will act as a token, and a password known by the user.}, keywords = {Analysis, Authentication, QR code, Website, Data-Base.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry