Prepared By
Gauswami Hetal
G.R.NO.707
Topic of overview
 Introduction
 Authentication schemes
 Functionalities required
 3D password selection and input

 ...
Introduction
 Commonly used authentication schemes are textual passwords,

graphical passwords and biometrics.
 3D passw...
Authentication Schemes
(1) Knowledge Based
(2) Token Based
(3) Biometric Based
Knowledge based
Password
 Password is basically an
encryption algorithms.
 It is 8-15 character or

slightly more than ...
Functionalities Required
 New scheme should combine the existing authentication

schemes.
 Freedom to select the type of...
3D Password Selection & Input
 3D environment space represented by the co-ordinates.
 User navigate into the 3D virtual ...
3D Virtual Environment
 3D virtual environment

affects the
usability, effectiveness &
acceptability of a 3D
password sys...
Application
 Critical servers.
 Nuclear & military facilities.
 Airplanes & jet fighters.

 ATM, desktop computers & l...
Disadvantages
 Difficult for blind people to use this technology.
 Requires sophisticated computers technology expensive...
3 d password
3 d password
3 d password
3 d password
3 d password
Upcoming SlideShare
Loading in …5
×

3 d password

1,702 views

Published on

3D Password

Published in: Technology
  • i want to download this can u pls send this to my mail annubtech2010@gmail.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

3 d password

  1. 1. Prepared By Gauswami Hetal G.R.NO.707
  2. 2. Topic of overview  Introduction  Authentication schemes  Functionalities required  3D password selection and input  Virtual environment design guidelines  Applications  Security analysis  Advantages & disadvantages
  3. 3. Introduction  Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.  3D password is a multifactor authentication scheme.  To be authenticated, we require 3D virtual environment.  combines recognition, recall, token and biometrics based systems.  Users choice to select the type of authentication technique.
  4. 4. Authentication Schemes (1) Knowledge Based (2) Token Based (3) Biometric Based
  5. 5. Knowledge based Password  Password is basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords now a days are kept which are very simple.
  6. 6. Functionalities Required  New scheme should combine the existing authentication schemes.  Freedom to select the type of authentication techniques.  Should provide secrets that are easy to remember, difficult to guess.
  7. 7. 3D Password Selection & Input  3D environment space represented by the co-ordinates.  User navigate into the 3D virtual environment using any input device.  The sequence of actions and interaction forms the user 3D password.
  8. 8. 3D Virtual Environment  3D virtual environment affects the usability, effectiveness & acceptability of a 3D password system.  3D environment reflects the administration needs the security requirements.
  9. 9. Application  Critical servers.  Nuclear & military facilities.  Airplanes & jet fighters.  ATM, desktop computers & laptops.
  10. 10. Disadvantages  Difficult for blind people to use this technology.  Requires sophisticated computers technology expensive.  A lot of program coding is required.

×