3d password

1,625 views

Published on

i make my ppt with different effects and pictures.so enjoy

Published in: Education
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,625
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
244
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

3d password

  1. 1. INTRODUCTION Commonly used authentication scheme are textual passwords, graphical password and biometrics.  Combine recognition , recall ,token and biometrics based system.  User choice select a type of authentication technique. In this paper , we present and evaluate our contribution that is a 3D PASSWORD.
  2. 2. Authentication Authentication is a process of validating who you are to whom you claimed to be. SCHEME……  KNOWLEDGE BASED 1. Recall based 2. Recognition based  TOKEN BASED e.g: smart card
  3. 3.  BIOMETRICS Automate the identification or verification of individual .
  4. 4.  The 3D password presents a virtual environment containing various virtual object.  The user walk through the environment and interact with the objects.  It is the combination and sequence of user interaction that occur in the 3D environment.
  5. 5. 3D VIRTUAL ENVIRONMENT o 3-D virtual environment affects the usability ,effectiveness and acceptability of a 3d password system. o 3-D environment reflects the administration needs and the security requirements.
  6. 6. The design of virtual environment should follow these guidelines:  Real Life Similarity Object Uniqueness & Distinction 3D Virtual Environment Size Number of objects & their types System Importance
  7. 7. A small virtual environment can be used in the following system like Atm Personal digital assistance Desktop computer & laptop Web authentication etc.
  8. 8. Attacks and Countermeasures Brute Well Force Attack studied Attack Shoulder-surfing Attack
  9. 9. Applications  Critical Servers  Nuclear Reactors & military Facilities  Airplanes and missile Guiding
  10. 10. Advantages  Flexibility Strength Ease to Memorize Respect of Privacy
  11. 11. Conclusion • The authentication can be improved with 3D password , because the unauthorized person may not interact with same object at a particular location as the legitimate user. • It is Difficult to crack ,because it has no fixed number of steps and particular procedure. • Added with biometrics and token verification this scheme because almost unbreakable.

×