Authors: Victor Solovyev
A two-step authentication system and method are provided for secure authentication that implements highly secure access to secure areas or resources with disabling the access when the main passcode is compromised. A user, after successfully passing through the passcode of the first-step verification stage, is asked to input an additional secret and presumably easy memorezible code (a pin, second password), or recognize an image for authentication (from a generated set). If during this second-step the user entered information fails to match the correct secret code, then the system sends signal message on intrusion to the user or other designated authorities through a communication device (e.g., email or telephone message) and the access is disabled immediately or after a few permitted attempts. Such authentication, while providing better security and user experience, does not require the usual practice of disabling the access, when the first-step access required information (such as complex alphanumeric password) is entered with errors in repeated access attempts.
Comments: 6 Pages. 3 figures
[v1] 2016-04-14 15:14:17
Unique-IP document downloads: 31 times
Vixra.org is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. Vixra.org will not be responsible for any consequences of actions that result from any form of use of any documents on this website.
Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.