In this modern world, hacking is growing faster, and there is no privacy for personal data. Therefore, we have decided to create passwords using new methods. This project demonstrates that there is no secret shared between the user and strangers; it presents a one minute challenge to unlock private data. Our project generates random codes minute by minute, and each password is only valid for just one minute, which is called OMP (One Minute Passcode). Therefore, the user doesn't know the correct password at all times. These passkeys are then sent to the user's mobile phone using the Twilio method, which is more secure and provided by Google to communicate through secret authentication methods and tokens. Thus, hacking becomes impossible with this level of complexity. In the future, if there's a possibility of hacking, we will update the cipher methods to unlock the data. Nowadays, the usage of PCs and mobile phones has increased rapidly. What if the passwords are not known by the user or strangers in this modern technology. Our project ensures privacy between users and hackers or strangers; secret passwords may sometimes be compromised, but random passwords will never be known to users or strangers. This idea is used here to maintain safety while unlocking our privacy or private sectors by creating random codes and sending them to the user's mobile IP value or number. We can easily unlock our device in a non-hackable form using brute force and Twilio, which are the main components of our data protection system. In the older authentication method, there were only 6-digit numbersto unlock data, which were available only for apps. Like an OTP, this method randomly generates a 6-digit code to unlock the private sector, which is available on the same phone or PC. This makes it easy for hackers to access details using your phone number or email. These passkeys are dynamic and not stable at all times, and theirsize istoo small. A relational database plays a major role here, we also use the emergency password method for user convenience. KEYWORDS: Security Authentication, Twilio, Database, Spyware attacks, Hacking, Password Authentication,Database.
Read full abstract