The document proposes a 3D password authentication scheme. It discusses drawbacks of existing authentication methods like textual and graphical passwords. The 3D password scheme combines recognition, recall, tokens, and biometrics in a 3D virtual environment. Users interact with virtual objects in the environment to create a password. This provides a large password space and flexibility. The document outlines guidelines for designing the 3D environment and applications like critical servers, airplanes, and nuclear facilities that could benefit from the strong authentication of 3D passwords.
3. INTRODUCTION
Authentication is any protocol or
process that permits one entity to
establish the identity of another
entity.
➢
In other words, authentication is
the process of determining whether
someone or something is, in fact, who
or what it is declared to be.
✔