Abstract

In today's world, the personal information of any person can be conventionally divided into two large categories: general and special. As you can understand from the name, the first category is responsible for the type of data that can be found in public access, namely: surname, first name, patronymic, signature, place and date of birth, citizenship, marital status, education, bank details, etc. Such a variety of personal data requires different methods and automated means of storage. Today, private and state institutions increasingly refuse to store information in paper form. This is explained by the low level of security of such storage facilities, which can be affected by fire, water, pests, etc. Information that exists in paper form is very easy to lose, for example, misplaced or lost during movement. It is shown that digital storage of information makes it possible to get rid of such problems. Personal data that is stored electronically can often be recovered even if the device from which it was accessed is lost. One of the main types of personal information in modern society is login data: login and password. That is why the algorithmic and software of the automated system for saving the user's personal data was developed. This system should enable the user to generate passwords resistant to standard hacking methods and store them in the database. The development of the automated system took place using the MVC architectural template, which is one of the options for implementing a multi-level architectural model. For detailed design and coding, an object-oriented Java programming language with static strict typing was chosen. It was also decided to develop an automated system in the form of a web application using the Spring framework. During the development process, a local database was designed, which will store personal data in the form of logins and passwords entered by the user or generated by the system itself. An algorithm for generating hack-resistant passwords has been developed. Hash algorithms are also used as an additional protection of the main password of the web application. A graphical interface has been created that allows the user to access the main functions of the automated system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.