SlideShare a Scribd company logo
Submitted by:
Richa Agarwal 10103472
Disha Agrawal 10103486
Submitted to:
Dr. Saurabh Kr. Raina
Ms. Hema N.
Ms. Aditi Sharma
There are many authentication techniques available, such as textual
passwords, graphical passwords, etc. but each of this individually has some
limitations & drawbacks.
3D password is a multi-password & multi-factor authentication
system as it uses various authentication techniques such as textual passwords,
graphical passwords, token-based passwords etc
Most important part of 3d password scheme is inclusion of 3d virtual
environment which consists of real time objects with which the user
interacts and the sequence of these interactions becomes the 3d password
of the user.
This scheme is hard to break & easy to use.
 Drawback of the existing authentication schemes is its two conflicting
requirements:
the selection of passwords that are easy to remember.
Difficult for intruders to guess.
The proposed 3-d password solves this issue
 To be authenticated, we present a 3-d virtual environment where the user
navigates and interacts with various objects. The sequence of actions and
interactions toward the objects inside the 3-D environment constructs
the user’s 3-D password.
 The recognition and recall based scheme helps user remember a
password which is impossible for others to guess.
 The new scheme provides secrets that are not easy to write down on
paper. Moreover, the scheme secrets are difficult to share with others.
A new encryption algorithm has been developed to implement this
authentication scheme
 The click points of user as well as the actions performed in the 3d
environment, both will be stored in such a way that the password becomes
resistant to spyware attacks.
The design of the 3-D virtual environment and the type of objects selected
would determine the 3-D password key space.
Therefore, the key space would vary greatly depending on the 3d virtual scene
and number of actions performed.
This variable key space with different kind of objects will make it extremely
difficult to launch any kind of cryptographic attacks against it.
The encryption algorithm will thus make the password impossible to break
and at the same time easy to remember
A large scale 3d virtual environment combining textual graphical and token
based scheme can be used for protecting high security demanding domains like:
Critical Servers
Nuclear and military facilities
Airplanes and jetfighters
A small 3-D virtual environment can be used in many systems, including the
following:
I. ATMs
II. Personal digital Assistants
III. Desktop computers and laptop logins
IV. Web authentication
V. Mobile applications privacy lock
1)A system of authentication that is not either recall based or recognition based only.
Instead, the system is a combination of recall, recognition, biometrics, and token-
based authentication schemes.
2) The method of claim 1 wherein password is stored, a new algorithm is used which
has the ability to store not just the click points but also the interactions of user with
objects in the 3d virtual environment.
3) The method of claim 1 wherein encryption is performed to store the password, a
new algorithm is used which has variable key space. Due to use of multiple schemes
into one scheme, password space is increased to a great extend. This makes it very
difficult to launch cryptographic attacks against this scheme. This authentication
scheme guarantees greater security over currently available schemes.
4) The system of encryption of claim 3 wherein more security is guaranteed than
any other existing authentication scheme. It is resistant to various cryptographic
attacks like:
• Key logger : In this attack attacker installs a software called key logger on
system where authentication scheme is used. This software stores text entered
through keyboard & that text is stored in a text file. In this way this attack is more
effective & useful for only textual password, but as 3D password is multi
password authentication scheme, so this kind of attacks are not much effective in
this case.
• Brute force attacks : In this kind of attacks, the attacker has to try ‘n’
number of possibilities of 3D Password. These attacks consider two major factors.
First is the required time to login; in 3d password time required for successful login
varies & is depend on number of actions & interactions as well as the size of 3d
virtual environment. Second factor is the cost required to attack; 3d password
scheme requires 3D virtual environment & cost of creating such a environment is
very high. Therefore this attack is also not effective.
• Well-studied attacks : In this attack intruder has to study the whole
password scheme. After exhaustive study about the scheme, attacker tries
combinations of different attacks on scheme. As 3d password scheme is multi-
factor & multi-password authentication scheme, the time and cost of this kind of
attack will be exponentially high.
5) The system of claim 1 that would provide secrets that are easy to remember and
very difficult for intruders to guess.
6) The system of claim 1 that would provide secrets that are not easy to write down
on paper. Moreover, the scheme secrets would be difficult to share with others.
7) The system of claim 1 wherein users will have the freedom of selection. Users
ought to have the freedom to select whether the 3d- password would be purely
recognition, recall, biometric or token based or a combination of two schemes or
more. This freedom of selection is necessary because users are different and they
have different requirements. Some users do not like to carry cards. Some users do
not like to provide biometrical data, and some users have poor memories.
Therefore, to ensure high user acceptability, the user’s freedom of selection is
important.
8) The method of claim 1 wherein the authentication scheme is compatible with all
kinds of devices, may it be tablet, mobile, PC or laptop.
9) The method of claim 1 wherein the authentication scheme will be cross platform
that is compatible with various operating systems like Windows, Linux, Android
etc. It is platform independent.
Patents:
[1] Graphical event-based password system , application no: US20040250138
[2] Password entry using 3D image with spatial alignment, application no: EP2466518A9
Publications:
[3] S. Man, D. Hong, and M. Mathews, "A shoulder surfing Resistant graphical password scheme," in
Proceedings of International conference on security and management. Las Vegas, NV, 2003.
[4] L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, an Electronic Bulletin
for
Undergraduate Research, vol. 4, 2002.
[5] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, “The design and analysis of
graphical passwords”,
in Proc. 8th USENIX Security Symp, Washington DC, Aug.1999, pp.1-14.
[6] D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in
Proceedings of Conference
on Human Factors in Computing Systems (CHI)

More Related Content

What's hot

3d password
3d  password3d  password
3d password
SHARDA SHARAN
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
3D Password
3D Password3D Password
3D Password
Ankit Nagar
 
3 d password
3 d password 3 d password
3 d password
blogger at indiandswad
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
3d password
3d password3d password
3d password
shivi123456
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
Mahesh Gadhwal
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
Jai Chaudhary
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
M Sangam Subudhi
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D Password
3D Password3D Password
3D Password
Preethi AKNR
 

What's hot (20)

3d password
3d  password3d  password
3d password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password 3 d password
3 d password
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password
3d password3d password
3d password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3 d password
3 d password3 d password
3 d password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi3 d password by M Sangam Subudhi
3 d password by M Sangam Subudhi
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D Password
3D Password3D Password
3D Password
 

Similar to 3d authentication system

New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
3 d
3 d3 d
C0361419
C0361419C0361419
C0361419
iosrjournals
 
3 d password
3 d password3 d password
3 d password
hetal gauswami
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
IAEME Publication
 
3d password
3d password3d password
3d password
Abhirami P S
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3 d ppt
3 d ppt3 d ppt
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 

Similar to 3d authentication system (20)

New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d
3d3d
3d
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d pass words
3d pass words3d pass words
3d pass words
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d
3 d3 d
3 d
 
C0361419
C0361419C0361419
C0361419
 
3 d password
3 d password3 d password
3 d password
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d password
3d password3d password
3d password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

3d authentication system

  • 1. Submitted by: Richa Agarwal 10103472 Disha Agrawal 10103486 Submitted to: Dr. Saurabh Kr. Raina Ms. Hema N. Ms. Aditi Sharma
  • 2. There are many authentication techniques available, such as textual passwords, graphical passwords, etc. but each of this individually has some limitations & drawbacks. 3D password is a multi-password & multi-factor authentication system as it uses various authentication techniques such as textual passwords, graphical passwords, token-based passwords etc Most important part of 3d password scheme is inclusion of 3d virtual environment which consists of real time objects with which the user interacts and the sequence of these interactions becomes the 3d password of the user. This scheme is hard to break & easy to use.
  • 3.
  • 4.  Drawback of the existing authentication schemes is its two conflicting requirements: the selection of passwords that are easy to remember. Difficult for intruders to guess. The proposed 3-d password solves this issue  To be authenticated, we present a 3-d virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password.  The recognition and recall based scheme helps user remember a password which is impossible for others to guess.  The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets are difficult to share with others.
  • 5. A new encryption algorithm has been developed to implement this authentication scheme  The click points of user as well as the actions performed in the 3d environment, both will be stored in such a way that the password becomes resistant to spyware attacks. The design of the 3-D virtual environment and the type of objects selected would determine the 3-D password key space. Therefore, the key space would vary greatly depending on the 3d virtual scene and number of actions performed. This variable key space with different kind of objects will make it extremely difficult to launch any kind of cryptographic attacks against it. The encryption algorithm will thus make the password impossible to break and at the same time easy to remember
  • 6. A large scale 3d virtual environment combining textual graphical and token based scheme can be used for protecting high security demanding domains like: Critical Servers Nuclear and military facilities Airplanes and jetfighters A small 3-D virtual environment can be used in many systems, including the following: I. ATMs II. Personal digital Assistants III. Desktop computers and laptop logins IV. Web authentication V. Mobile applications privacy lock
  • 7. 1)A system of authentication that is not either recall based or recognition based only. Instead, the system is a combination of recall, recognition, biometrics, and token- based authentication schemes. 2) The method of claim 1 wherein password is stored, a new algorithm is used which has the ability to store not just the click points but also the interactions of user with objects in the 3d virtual environment. 3) The method of claim 1 wherein encryption is performed to store the password, a new algorithm is used which has variable key space. Due to use of multiple schemes into one scheme, password space is increased to a great extend. This makes it very difficult to launch cryptographic attacks against this scheme. This authentication scheme guarantees greater security over currently available schemes.
  • 8. 4) The system of encryption of claim 3 wherein more security is guaranteed than any other existing authentication scheme. It is resistant to various cryptographic attacks like: • Key logger : In this attack attacker installs a software called key logger on system where authentication scheme is used. This software stores text entered through keyboard & that text is stored in a text file. In this way this attack is more effective & useful for only textual password, but as 3D password is multi password authentication scheme, so this kind of attacks are not much effective in this case. • Brute force attacks : In this kind of attacks, the attacker has to try ‘n’ number of possibilities of 3D Password. These attacks consider two major factors. First is the required time to login; in 3d password time required for successful login varies & is depend on number of actions & interactions as well as the size of 3d virtual environment. Second factor is the cost required to attack; 3d password scheme requires 3D virtual environment & cost of creating such a environment is very high. Therefore this attack is also not effective. • Well-studied attacks : In this attack intruder has to study the whole password scheme. After exhaustive study about the scheme, attacker tries combinations of different attacks on scheme. As 3d password scheme is multi- factor & multi-password authentication scheme, the time and cost of this kind of attack will be exponentially high.
  • 9. 5) The system of claim 1 that would provide secrets that are easy to remember and very difficult for intruders to guess. 6) The system of claim 1 that would provide secrets that are not easy to write down on paper. Moreover, the scheme secrets would be difficult to share with others. 7) The system of claim 1 wherein users will have the freedom of selection. Users ought to have the freedom to select whether the 3d- password would be purely recognition, recall, biometric or token based or a combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements. Some users do not like to carry cards. Some users do not like to provide biometrical data, and some users have poor memories. Therefore, to ensure high user acceptability, the user’s freedom of selection is important. 8) The method of claim 1 wherein the authentication scheme is compatible with all kinds of devices, may it be tablet, mobile, PC or laptop. 9) The method of claim 1 wherein the authentication scheme will be cross platform that is compatible with various operating systems like Windows, Linux, Android etc. It is platform independent.
  • 10. Patents: [1] Graphical event-based password system , application no: US20040250138 [2] Password entry using 3D image with spatial alignment, application no: EP2466518A9 Publications: [3] S. Man, D. Hong, and M. Mathews, "A shoulder surfing Resistant graphical password scheme," in Proceedings of International conference on security and management. Las Vegas, NV, 2003. [4] L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, an Electronic Bulletin for Undergraduate Research, vol. 4, 2002. [5] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A.D. Rubin, “The design and analysis of graphical passwords”, in Proc. 8th USENIX Security Symp, Washington DC, Aug.1999, pp.1-14. [6] D. Weinshall and S. Kirkpatrick, "Passwords You’ll Never Forget, but Can’t Recall," in Proceedings of Conference on Human Factors in Computing Systems (CHI)