used authentication scheme
are textual passwords, graphical
password and biometrics.
Combine recognition , recall ,token
and biometrics based system.
User choice select a type of
In this paper , we present and evaluate our contribution that is a
Authentication is a process of validating who you are to whom you claimed to
1. Recall based
2. Recognition based
e.g: smart card
Automate the identification or verification of individual .
The 3D password presents a virtual environment containing various virtual
The user walk through the environment and interact with the objects.
It is the combination and sequence of user interaction that occur in the
3D VIRTUAL ENVIRONMENT
3-D virtual environment affects the usability ,effectiveness and
acceptability of a 3d password system.
3-D environment reflects the administration needs and the security
The design of virtual environment
should follow these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
A small virtual environment can be used
in the following system like
computer & laptop
Attacks and Countermeasures
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
The authentication can be improved with 3D password ,
because the unauthorized person may not interact with
same object at a particular location as the legitimate user.
• It is Difficult to crack ,because it has no fixed number of
steps and particular procedure.
• Added with biometrics and token verification this scheme
because almost unbreakable.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.