SlideShare a Scribd company logo
COOKIES AUTHENTICATION
CSIT-555
PRESENTED BY:
ROSHAN SILWAL
DEFINITION OF NEED
• A Web server has no memory so the hosted Web site that the user is
visiting transfers a cookie file of the browser on the computer's hard disk
so that the Web site can remember who is the user and the user
preferences. This message exchange allows the Web server to use this
information to present the user with customized Web pages.
• Cookies allow online marketers and retailers deliver that personable
experience with their customers.
DEFINITION OF NEED
• Authentication cookies are the most common method used by web
servers to know whether the user is logged in or not, and which account
they are logged in with
• For example, the Google search engine once used cookies to allow users
(even non-registered ones) to decide how many search results per page
they wanted to see.
SCOPE OF PROJECT
•Our system authenticates the cookies.
•Our system verifies information provided by user.
•It grants access to authorized user.
•It denies access to unauthorized users.
ASSUMPTIONS MADE
• We have assumed testing data as client’s user id and password
only.
• We have used demo number of authorized clients.
• Our database is dynamic, where we can edit number of fields.
SOLUTION APPROACH
1. We first researched about cookies.
2. We found reasons to authenticate it.
3. We discussed among group members and formed a flowchart to approach
solution.
4. We used php for coding our system.
5. We also created a database to store information.
WHAT ARE COOKIES ?
• A cookie is a text file that a website stores on a client’s computer to
maintain information about the client during and between browsing
sessions.
• Are designed to hold a small amount of data specific to a particular
client and website, and can be accessed either by the web server or the
client computer
• Useful for:
• Shopping carts
• User communities
• Personalized sites
• Not recommended for storing sensitive data
• Store a unique identification string that will match a user held securely
in a database
COOKIES AUTHENTICATION
• In web services, the cookie is authenticated by providing the
user name and password.
• In addition, some web services may ask the security question
that was created during the sign up phase to make the user
account more secure.
BENEFITS OF COOKIES AUTHENTICATION
• Cookies give customized experience and helps user.
• Cookies are simple to use and implement
• It occupies less memory, and these are stored in clients
computer which saves memory burden on server.
• Cookies can be set to expire as per requirement. We can assign
it for particular time-frame.
PROPOSED MODEL
Proposed model
We have proposed a model for the implementation of the project
which is given below. Firstly, we enter the URL for the login
process then it will be sent to the server and sends the message
back to the server. The authenticate script takes the name and
given password. Now this name and password will be compared
with the name and password stored in the database and then
carried out the authentication process [6]. This is also clearly
explaining in the below flowchart.
PROPOSED MODEL CONTINUED
Start
Is
user
valid
?
Verify user
Process
request
end
ALGORITHM
1. Start
2. Create a form to input user-id and password.
3. Send the entered user-id and password to the server.
4. Validate and compare the user-id and password
a. Goto step 2 if not valid
b. Goto step 5 if valid
ALGORTHM CONTD….
5. Display the successful message
6. Ask user for next request and continue.
7.Stop
FLOWCHART MAIN
SCRENSHOT OF LOGIN FORM CREATED
SCREENSHOT FOR DIFFERENT INPUTS
SCREENSHOTS OF VALID AND INVALID
LOGIN ATTEMPTS
DEMO
Cookies authentication

More Related Content

PDF
Secure software design
PDF
Firewall & types of Firewall
PDF
Fundamental of Information Technology
PPSX
White Box testing by Pankaj Thakur, NITTTR Chandigarh
PPTX
The Advantages and Disadvantages of Cloud Computing
DOCX
®Three Undocumented Layers of the OSI Model  and The.docx
PDF
STLC (Software Testing Life Cycle)
PPTX
Software Testing or Quality Assurance
Secure software design
Firewall & types of Firewall
Fundamental of Information Technology
White Box testing by Pankaj Thakur, NITTTR Chandigarh
The Advantages and Disadvantages of Cloud Computing
®Three Undocumented Layers of the OSI Model  and The.docx
STLC (Software Testing Life Cycle)
Software Testing or Quality Assurance

What's hot (20)

PPTX
Android Training (Storing data using SQLite)
PDF
Test data management
PPT
metrics.ppt
PPTX
SQL Injections - A Powerpoint Presentation
PPTX
Black Box Testing
PPTX
Introduction to software testing
PPTX
Software Engineering- Types of Testing
PPTX
Thread presentation
PDF
Equivalence partitioning
PPTX
Coding standards
PPTX
Wireless Attacks
PPT
Software architecture
PPTX
System Security-Chapter 1
PPTX
Secure coding practices
PPTX
OOP with Java
PDF
Network Security Presentation
PPTX
Security & protection in operating system
PPTX
Threat modelling(system + enterprise)
PPTX
Sql injection
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Android Training (Storing data using SQLite)
Test data management
metrics.ppt
SQL Injections - A Powerpoint Presentation
Black Box Testing
Introduction to software testing
Software Engineering- Types of Testing
Thread presentation
Equivalence partitioning
Coding standards
Wireless Attacks
Software architecture
System Security-Chapter 1
Secure coding practices
OOP with Java
Network Security Presentation
Security & protection in operating system
Threat modelling(system + enterprise)
Sql injection
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Ad

Similar to Cookies authentication (20)

PDF
Session and Cookies.pdf
PPTX
cookie attributes and tokens,jwt tokens1.ppt
PPTX
Sessions&cookies
PPTX
Session and cookies,get and post
PPTX
APEX & Cookie Monster
PPTX
Backend Technologies Notes ajef;asnfkndfdsa
PPTX
Understanding Session Hijacking: Protecting Your Online Sessions
PPT
session and cookies.ppt
PPTX
SSL and Wordpress
PPTX
Using cookies and sessions
PPT
16 cookies
PPTX
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
PPTX
COOKIES.pptx
PPTX
SCWCD : Session management : CHAP : 6
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
CIS14: Authentication: Who are You? You are What You Eat
PPTX
MCSA 70-412 Chapter 06
PPTX
Introduction to Web Security
PPTX
Security asp.net application
PDF
Session,Cookies and Authentication
Session and Cookies.pdf
cookie attributes and tokens,jwt tokens1.ppt
Sessions&cookies
Session and cookies,get and post
APEX & Cookie Monster
Backend Technologies Notes ajef;asnfkndfdsa
Understanding Session Hijacking: Protecting Your Online Sessions
session and cookies.ppt
SSL and Wordpress
Using cookies and sessions
16 cookies
EVOLVE'13 | Enhance | Permission Sensitive Caching | Paul McMahon & Jason Rap...
COOKIES.pptx
SCWCD : Session management : CHAP : 6
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
MCSA 70-412 Chapter 06
Introduction to Web Security
Security asp.net application
Session,Cookies and Authentication
Ad

Recently uploaded (20)

PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
history of c programming in notes for students .pptx
PDF
System and Network Administration Chapter 2
PDF
top salesforce developer skills in 2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
assetexplorer- product-overview - presentation
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Transform Your Business with a Software ERP System
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Nekopoi APK 2025 free lastest update
PPTX
L1 - Introduction to python Backend.pptx
PDF
System and Network Administraation Chapter 3
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Digital Strategies for Manufacturing Companies
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
history of c programming in notes for students .pptx
System and Network Administration Chapter 2
top salesforce developer skills in 2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
assetexplorer- product-overview - presentation
Odoo Companies in India – Driving Business Transformation.pdf
Transform Your Business with a Software ERP System
Operating system designcfffgfgggggggvggggggggg
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Nekopoi APK 2025 free lastest update
L1 - Introduction to python Backend.pptx
System and Network Administraation Chapter 3
wealthsignaloriginal-com-DS-text-... (1).pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Digital Strategies for Manufacturing Companies

Cookies authentication

  • 2. DEFINITION OF NEED • A Web server has no memory so the hosted Web site that the user is visiting transfers a cookie file of the browser on the computer's hard disk so that the Web site can remember who is the user and the user preferences. This message exchange allows the Web server to use this information to present the user with customized Web pages. • Cookies allow online marketers and retailers deliver that personable experience with their customers.
  • 3. DEFINITION OF NEED • Authentication cookies are the most common method used by web servers to know whether the user is logged in or not, and which account they are logged in with • For example, the Google search engine once used cookies to allow users (even non-registered ones) to decide how many search results per page they wanted to see.
  • 4. SCOPE OF PROJECT •Our system authenticates the cookies. •Our system verifies information provided by user. •It grants access to authorized user. •It denies access to unauthorized users.
  • 5. ASSUMPTIONS MADE • We have assumed testing data as client’s user id and password only. • We have used demo number of authorized clients. • Our database is dynamic, where we can edit number of fields.
  • 6. SOLUTION APPROACH 1. We first researched about cookies. 2. We found reasons to authenticate it. 3. We discussed among group members and formed a flowchart to approach solution. 4. We used php for coding our system. 5. We also created a database to store information.
  • 7. WHAT ARE COOKIES ? • A cookie is a text file that a website stores on a client’s computer to maintain information about the client during and between browsing sessions. • Are designed to hold a small amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer • Useful for: • Shopping carts • User communities • Personalized sites • Not recommended for storing sensitive data • Store a unique identification string that will match a user held securely in a database
  • 8. COOKIES AUTHENTICATION • In web services, the cookie is authenticated by providing the user name and password. • In addition, some web services may ask the security question that was created during the sign up phase to make the user account more secure.
  • 9. BENEFITS OF COOKIES AUTHENTICATION • Cookies give customized experience and helps user. • Cookies are simple to use and implement • It occupies less memory, and these are stored in clients computer which saves memory burden on server. • Cookies can be set to expire as per requirement. We can assign it for particular time-frame.
  • 10. PROPOSED MODEL Proposed model We have proposed a model for the implementation of the project which is given below. Firstly, we enter the URL for the login process then it will be sent to the server and sends the message back to the server. The authenticate script takes the name and given password. Now this name and password will be compared with the name and password stored in the database and then carried out the authentication process [6]. This is also clearly explaining in the below flowchart.
  • 12. ALGORITHM 1. Start 2. Create a form to input user-id and password. 3. Send the entered user-id and password to the server. 4. Validate and compare the user-id and password a. Goto step 2 if not valid b. Goto step 5 if valid
  • 13. ALGORTHM CONTD…. 5. Display the successful message 6. Ask user for next request and continue. 7.Stop
  • 15. SCRENSHOT OF LOGIN FORM CREATED
  • 17. SCREENSHOTS OF VALID AND INVALID LOGIN ATTEMPTS
  • 18. DEMO