Your SlideShare is downloading. ×
3d password
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

3d password

1,180
views

Published on

i make my ppt with different effects and pictures.so enjoy …

i make my ppt with different effects and pictures.so enjoy

Published in: Education

0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,180
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
211
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. INTRODUCTION Commonly used authentication scheme are textual passwords, graphical password and biometrics.  Combine recognition , recall ,token and biometrics based system.  User choice select a type of authentication technique. In this paper , we present and evaluate our contribution that is a 3D PASSWORD.
  • 2. Authentication Authentication is a process of validating who you are to whom you claimed to be. SCHEME……  KNOWLEDGE BASED 1. Recall based 2. Recognition based  TOKEN BASED e.g: smart card
  • 3.  BIOMETRICS Automate the identification or verification of individual .
  • 4.  The 3D password presents a virtual environment containing various virtual object.  The user walk through the environment and interact with the objects.  It is the combination and sequence of user interaction that occur in the 3D environment.
  • 5. 3D VIRTUAL ENVIRONMENT o 3-D virtual environment affects the usability ,effectiveness and acceptability of a 3d password system. o 3-D environment reflects the administration needs and the security requirements.
  • 6. The design of virtual environment should follow these guidelines:  Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  • 7. A small virtual environment can be used in the following system like Atm Personal digital assistance Desktop computer & laptop Web authentication etc.
  • 8. Attacks and Countermeasures Brute Well Force Attack studied Attack Shoulder-surfing Attack
  • 9. Applications  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  • 10. Advantages  Flexibility Strength Ease to Memorize Respect of Privacy
  • 11. Conclusion • The authentication can be improved with 3D password , because the unauthorized person may not interact with same object at a particular location as the legitimate user. • It is Difficult to crack ,because it has no fixed number of steps and particular procedure. • Added with biometrics and token verification this scheme because almost unbreakable.

×