Back to Search
Start Over
Implementation of two-factor user authentication in computer systems.
- Source :
-
Military Technical Courier / Vojnotehnicki Glasnik . jan-mar2024, Vol. 72 Issue 1, p170-191. 22p. - Publication Year :
- 2024
-
Abstract
- Introduction/purpose: The paper explores the implementation of two-factor authentication (2FA) in computer systems, addressing the increasing need for enhanced security. It highlights the vulnerabilities of password-based authentication and emphasizes the advantages of 2FA in mitigating digital threats. The development of the VoiceAuth application, integrating 2FA through a combination of password and voice authentication, serves as a practical illustration. Methods: The research adopts a three-tier architecture for the VoiceAuth application, encompassing a database, server-side REST API, and clientside single-page application. Speaker verification is employed for voice authentication, analyzing elements like pitch, rhythm, and vocal tract shapes.The paper also discusses possibilities for future upgrades, suggesting enhancements such as real-time voice verification and additional 2FA methods. Results: The application's implementation involves a detailed breakdown of the REST API architecture, Single Page Applications (SPAs), and the Speaker Verification service. Conclusion: The research underscores the crucial role of two-factor authentication (2FA) in bolstering the security of computer systems. The VoiceAuth application serves as a practical demonstration, showcasing the successful integration of 2FA through a combination of password and voice authentication. The modular architecture of the application allows for potential upgrades. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 00428469
- Volume :
- 72
- Issue :
- 1
- Database :
- Academic Search Index
- Journal :
- Military Technical Courier / Vojnotehnicki Glasnik
- Publication Type :
- Academic Journal
- Accession number :
- 176108615
- Full Text :
- https://doi.org/10.5937/vojtehg72-48081