Device-based password management system (bulwark)
Keywords:
Encryption, Cyber Security, Password Management, Fingerprint Authentication, Browser Extension, Socket Programming, Java Server Program, QR CodeAbstract
Password manager systems currently available for the users come with serious privacy and vulnerability issues of their own. This paper gives an introduction to Bulwark, a novel device-based password management system, which stores the login credentials on a mobile device, and can enter the credentials on any target device through an encrypted cross-platform system, only after being authenticated by the user biometrics to ensure that only the right user can fill the saved passwords. This technology aims to eliminate the need to trust and rely on third-party cloud-based services or computers with storing and managing our passwords, and has also resolved major privacy and vulnerability issues with the current options available for users.
Downloads
References
AkoMuhamad Abdullah, Advanced Encryption Standard (AES): Algorithm to Encrypt and Decrypt Data, Cryptography and Network Security 2017.
Erdem E, O. Kucukkurt K., Samurkas, E. Kanargi, and U. Celikkan, A smartcard-based Single Sign-On and password management solution as a browser extension, International Conference on Education and Management Technology 2010, pp. 539-543.
Dhawan M and Ganapathy V, Analyzing Information Flow in JavaScript-Based Browser Extensions, Annual Computer Security Applications Conference 2009, pp.382-391, DOI: 10.1109/ACSAC.2009.43.
Yıldırım N and Varol A., Android-based mobile application development for web login authentication using fingerprint recognition feature,23rd Signal Processing and Communications Applications Conference (SIU), 2015, pp. 2662-2665, DOI: 10.1109/SIU.2015.7130436.
ShripalRawal, "Advanced Encryption Standard (AES) and It’s Working," International Research Journal of Engineering and Technology (IRJET) 2016.
Dee T., Richardson I., Continuous Transparent Mobile Device Touchscreen Soft Keyboard Biometric Authentication, 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems (VLSID) 2019, pp. 539-540, DOI: 10.1109/VLSID.2019.00125.
KhedrWalid, Improved keylogging and shoulder-surfing resistant visual two-factor authentication protocol, Journal of Information Security and Applications 2018, Volume 39, Pages 41-57.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.