SlideShare a Scribd company logo
1 of 14
 Commonly used authentication schemes are
textual passwords, graphical passwords and
biometrics.
 3D password is a multifactor authentication
scheme.
 To be authenticated, we require a 3D virtual
environment.
 Combines recognition, recall, token, and
biometrics based systems.
 Users choice to select the type of authentication
technique.
 KNOWLEDGE BASED
Recall based
Recognition based
 TOKEN BASED
e.g : smart card
 BIOMETRIC BASED
◦ Fingerprint ,palm prints ,hand geometry ,face recognition
◦ Intrusiveness upon a user’s personal characteristics.
 GRAPHICAL PASSWORDS
◦ Recognition based
◦ Recall based
 New scheme should combine the existing
authentication schemes
 Freedom to select the type of authentication
technique.
 Should provide secrets that are easy to
remember, difficult to guess.
 3D environment space represented by the co-
ordinates
 User navigate into the 3D virtual environment
using any input device.
 The sequence of actions and interactions forms
the users 3D password.
 Real-life similarity
 Object uniqueness and distinction
 Three-dimensional virtual environment
 System importance
 Critical servers.
 Nuclear and military facilities.
 Airplanes and jet fighters.
 ATM, desktop computers and laptops.
 3D Password Space Size.
 3D Password Distribution Knowledge.
 Brute Force Attack
 Well-Studied Attack
 Shoulder Surfing Attack
 Timing Attack
 Commonly used authentication schemes are
vulnerable to attacks.
 3D Password is a multifactor authentication
scheme.
 Design of 3D virtual environment, selection of
objects inside the environment, and the object
type reflects the resulted password space.
 User’s choice and decision to construct the
desired and preferred 3D password
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi

More Related Content

What's hot (20)

3 d password
3 d password 3 d password
3 d password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d password
3 d password3 d password
3 d password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d password
3d password3d password
3d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password
3d password3d password
3d password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3 d password
3 d password3 d password
3 d password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3D password
3D password 3D password
3D password
 

Viewers also liked

NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMAswati singh
 
3-D TECHNOLOGY
3-D TECHNOLOGY 3-D TECHNOLOGY
3-D TECHNOLOGY dharmawath
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 

Viewers also liked (6)

NOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMANOVEL 3d GRAPHICAL PASSWORD SCHEMA
NOVEL 3d GRAPHICAL PASSWORD SCHEMA
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3-D TECHNOLOGY
3-D TECHNOLOGY 3-D TECHNOLOGY
3-D TECHNOLOGY
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 

Similar to 3 d password by M Sangam Subudhi (18)

3 d password
3 d password3 d password
3 d password
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password
3D Password3D Password
3D Password
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3 d
3 d3 d
3 d
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 

Recently uploaded

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Recently uploaded (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

3 d password by M Sangam Subudhi

  • 1.
  • 2.  Commonly used authentication schemes are textual passwords, graphical passwords and biometrics.  3D password is a multifactor authentication scheme.  To be authenticated, we require a 3D virtual environment.
  • 3.  Combines recognition, recall, token, and biometrics based systems.  Users choice to select the type of authentication technique.
  • 4.  KNOWLEDGE BASED Recall based Recognition based  TOKEN BASED e.g : smart card
  • 5.  BIOMETRIC BASED ◦ Fingerprint ,palm prints ,hand geometry ,face recognition ◦ Intrusiveness upon a user’s personal characteristics.  GRAPHICAL PASSWORDS ◦ Recognition based ◦ Recall based
  • 6.  New scheme should combine the existing authentication schemes  Freedom to select the type of authentication technique.  Should provide secrets that are easy to remember, difficult to guess.
  • 7.  3D environment space represented by the co- ordinates  User navigate into the 3D virtual environment using any input device.  The sequence of actions and interactions forms the users 3D password.
  • 8.  Real-life similarity  Object uniqueness and distinction  Three-dimensional virtual environment  System importance
  • 9.  Critical servers.  Nuclear and military facilities.  Airplanes and jet fighters.  ATM, desktop computers and laptops.
  • 10.  3D Password Space Size.  3D Password Distribution Knowledge.
  • 11.  Brute Force Attack  Well-Studied Attack  Shoulder Surfing Attack  Timing Attack
  • 12.  Commonly used authentication schemes are vulnerable to attacks.  3D Password is a multifactor authentication scheme.  Design of 3D virtual environment, selection of objects inside the environment, and the object type reflects the resulted password space.  User’s choice and decision to construct the desired and preferred 3D password