Research Article

Access to Network Login by Three-Factor Authentication for Effective Information Security

Pseudocode 1

Three-factor authentication.
Initialize the Login Account
Enter User Id or Login Id
In the First place element: Enter Alphanumeric Password
If
The ID, Password coordinates and are authenticated,
Then
Authentication approval by Admin.
Proceed for Second factor
Else
Id or Password may be invalid or wrong
Try again
After 5 unsuccessful attempts
Alarm to user registered mobile or message to (alternate) mail account
For confirmation, verification and intimation to reset Password
Second factor: Graphical Password
User has to click the image which appears on the screen
This may be Pass Face, sequence of picture according to the user choice
If
The Password is Authenticated, Authentication approval by Admin.
Then
Proceed for Third Gateway
Else
Return and Go for revalidation process
After 5 unsuccessful attempts
Alarm to user registered mobile or message to alternate mail account
For confirmation, verification and intimation to reset Graphical Password
Third factor: Biometric Authentication
Individuals are uniquely identified by their biological traits
If
The proof of identity is Authenticated, Authentication approval by Admin.
Then
Access to the Login Account
Else
Return and
Go for revalidation process.