3-D Password
Technology
for more secure
authentication
 TEXTUAL PASSWORD
 GRAPHICAL PASSWORD
 BIOMETRICS
 TOKEN BASED
Existing
System
• The 3 d password which are more
customizable and very interesting way of
authentication.
• A 3-d password is a multifactor authentication
scheme that combine
Recognition
+ recall
+ token
+biometrics
in one authentication system
• The 3D password presents a virtual
environment containing various virtual
objects.
• The user walks through the environment and
interacts with the objects.
• It is the combination and sequence of user
interactions that occurs in 3D environment.
3-D virtual environment
Virtual objects
• Virtual objects can be any object we encounter in real life.
 A computer on which the user can type in.
 A fingerprint reader that requires users finferprint.
 A paper or white board on which users can type
 An automated teller machine (ATM) machine that requires a
tokem.
 A light that can be switched on/off.
 A television or radio.
 A car that can be driven.
 A graphical password scheme.
3Dvirtual environment
• 3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
• 3-D environment reflects one administration needs and the security
requirements.
The design of 3D virtual environments
should follow these guidelines:
 Real life similarity
 Object uniqueness & distinction
 3-D virtual environment size
 Number of objects & their types.
advantages
 Flexibility
 Strength
 Ease to memorize
 Respect of privacy
APPLICATIONS
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear reactors & military facilities
 Airplanes and missile guiding
 Banks
A small virtual environment can be used in the following
systems like -
• Atm
• Personal digital assistance
• Desktop computers & laptops
• Web authentication etc.
ATTACKSANDCOUNTERMEASURES
 Brute force attack
 Well studied attack
 Shoulder-surfing attack
CONCLUSION
• The authentication can be improved with 3d password ,
because the unauthorized person may not interact with
same object at a particular location as the legitimate user.
• It is difficult to crack , because it has no fixed number of
steps and a particular procedure.
• Added with biometrics and token verification this schema
becomes almost unbreakable.
Thank
You

3 d ppt

  • 1.
    3-D Password Technology for moresecure authentication
  • 2.
     TEXTUAL PASSWORD GRAPHICAL PASSWORD  BIOMETRICS  TOKEN BASED Existing System
  • 3.
    • The 3d password which are more customizable and very interesting way of authentication. • A 3-d password is a multifactor authentication scheme that combine Recognition + recall + token +biometrics in one authentication system
  • 4.
    • The 3Dpassword presents a virtual environment containing various virtual objects. • The user walks through the environment and interacts with the objects. • It is the combination and sequence of user interactions that occurs in 3D environment.
  • 5.
  • 7.
    Virtual objects • Virtualobjects can be any object we encounter in real life.  A computer on which the user can type in.  A fingerprint reader that requires users finferprint.  A paper or white board on which users can type  An automated teller machine (ATM) machine that requires a tokem.  A light that can be switched on/off.  A television or radio.  A car that can be driven.  A graphical password scheme.
  • 8.
    3Dvirtual environment • 3-Dvirtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. • 3-D environment reflects one administration needs and the security requirements.
  • 9.
    The design of3D virtual environments should follow these guidelines:  Real life similarity  Object uniqueness & distinction  3-D virtual environment size  Number of objects & their types.
  • 10.
    advantages  Flexibility  Strength Ease to memorize  Respect of privacy
  • 11.
    APPLICATIONS The 3D password’smain application domains are protecting critical systems and resources.  Critical Servers  Nuclear reactors & military facilities  Airplanes and missile guiding  Banks
  • 12.
    A small virtualenvironment can be used in the following systems like - • Atm • Personal digital assistance • Desktop computers & laptops • Web authentication etc.
  • 13.
    ATTACKSANDCOUNTERMEASURES  Brute forceattack  Well studied attack  Shoulder-surfing attack
  • 14.
    CONCLUSION • The authenticationcan be improved with 3d password , because the unauthorized person may not interact with same object at a particular location as the legitimate user. • It is difficult to crack , because it has no fixed number of steps and a particular procedure. • Added with biometrics and token verification this schema becomes almost unbreakable.
  • 15.