SlideShare a Scribd company logo
3D Password3D Password
PRESENTED BY:-PRESENTED BY:-
Meera yadavMeera yadav
Asim baigAsim baig
S7,CSE DepartmentS7,CSE Department
TTable of contentable of content
S.no. Topic name Page no.
1 Introduction 4
2 Existing system 5
3 Human authentication techniques 6
4 3D password 7
5 Brief description of system 8-9
6 Virtual object 10
7 3D virtual environment 11
8 Design guidelines 12
9 System implementation 13
10 Application 14
11 State diagram 15
12 Advantages 16
13 Conclusion 17
14 Query or any doubts 18
IIntroductionntroduction::(Need and Purpose)(Need and Purpose)
Need:-Need:-
 Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness
because simple password is only based on humanbecause simple password is only based on human
memory . So now a days a new technique are usememory . So now a days a new technique are use
called 3D password is used.called 3D password is used.
Purpose:-Purpose:-
 3D password provide secure services you with a3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions.
 Easy to accessEasy to access
EExisting system for securityxisting system for security
 Textual passwordTextual password
 Graphical passwordGraphical password
 BiometricsBiometrics
 Token basedToken based
HHuman authentication techniquesuman authentication techniques
 Knowledge based (what you know)Knowledge based (what you know)
Textual passwordTextual password
 TokenToken based(what you have)based(what you have)
ATM cardsATM cards
KeysKeys
ID cardsID cards
 Biometrics(what you are)Biometrics(what you are)
Fingerprints,PalmprintsFingerprints,Palmprints
Hand geometryHand geometry
Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
33D passwordD password
 A 3D passwords which areA 3D passwords which are
more customizable, and verymore customizable, and very
interesting way ofinteresting way of
authentication.authentication.
 A 3D password isA 3D password is
multifactor authenticationmultifactor authentication
scheme that combines-scheme that combines-
RecognitionRecognition
+Recall+Recall
+Tokens+Tokens
+Biometrics+Biometrics
is one authentication system.is one authentication system.
BBrief description of systemrief description of system
 The 3D password presents in theThe 3D password presents in the VirtualVirtual
environmentenvironment containing various virtual objects.containing various virtual objects.
 The user walks through in the environment andThe user walks through in the environment and
interacts with the objects.interacts with the objects.
 It is the combination and sequence of userIt is the combination and sequence of user
interactions that occur in the 3d environment.interactions that occur in the 3d environment.
The user presented with this 3D virtualThe user presented with this 3D virtual
environment where the user navigates andenvironment where the user navigates and
interacts with various objects.interacts with various objects.
The sequence of action and interaction towardsThe sequence of action and interaction towards
the objects inside the 3D environment constructsthe objects inside the 3D environment constructs
the user’s 3D password.the user’s 3D password.
VVirtual objectsirtual objects
Virtual objects can be any object weVirtual objects can be any object we
encounter in real Life-encounter in real Life-
 A computer on which user can type.A computer on which user can type.
 A fingerprint reader that requires userA fingerprint reader that requires user
fingerprints.fingerprints.
 An automated teller (ATM) machineAn automated teller (ATM) machine
that requires a token.that requires a token.
 A light that can be switched on/off.A light that can be switched on/off.
 A television or radio.A television or radio.
 A car that can be driven.A car that can be driven.
 A graphical password scheme.A graphical password scheme.
33D virtual environmentD virtual environment
The 3D environment effects the usability,The 3D environment effects the usability,
effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D
password system.password system.
The 3D environment reflects the administrationThe 3D environment reflects the administration
needs and security requirements.needs and security requirements.
DDesign guidelineesign guideline
 The design of 3D virtual environment shouldThe design of 3D virtual environment should
follows these guidelines:follows these guidelines:
SSystem implementationystem implementation
For example, the user can enter the virtualFor example, the user can enter the virtual
environment and type something on a computer thatenvironment and type something on a computer that
exists in (x1,y1,z1) position.exists in (x1,y1,z1) position.
Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition
device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide
his/her fingerprint.his/her fingerprint.
Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car
door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
AApplicationspplications
The 3D password’s main application domains areThe 3D password’s main application domains are
protecting critical systems and resources.protecting critical systems and resources.
 Critical serversCritical servers
 Nuclear reactors and military facilitiesNuclear reactors and military facilities
 Airplanes and missile guidingAirplanes and missile guiding
 In addition, the 3D password can be used in theIn addition, the 3D password can be used in the
less critical systemsless critical systems
 A small virtual environment can be used in theA small virtual environment can be used in the
following system like: ATM, personal digitalfollowing system like: ATM, personal digital
assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web
authentication etc.
SState diagramtate diagram
AAdvantagesdvantages
 Provide securityProvide security
 3D password can not take by3D password can not take by
other personother person
 3D graphical password has no3D graphical password has no
limitlimit
 Implementation of system is easyImplementation of system is easy
 Password can remember easilyPassword can remember easily
 Password helps to keep lot ofPassword helps to keep lot of
personal details.personal details.
CConclusiononclusion
 The authenticationThe authentication can be improved with 3Dcan be improved with 3D
passwordpassword, because unauthorized person may not, because unauthorized person may not
interact with same object at a particular locationinteract with same object at a particular location
as the legitimate user.as the legitimate user.
 It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed
number of steps and a particular procedure.number of steps and a particular procedure.
 Added with token and biometrics this schemaAdded with token and biometrics this schema
becomes almostbecomes almost unbreakableunbreakable..
All of youAll of you
Any Doubts????????????Any Doubts????????????

More Related Content

What's hot

3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
Rajashree Swain
 
3D password
3D password 3D password
3D password
Muniba Bukhari
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
shubhangi singh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
JYoTHiSH o.s
 
3D Password
3D Password3D Password
3D Password
Shubham Rungta
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
Karishma Khan
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
Sambit Mishra
 
3 d password
3 d password3 d password
3 d password
yogendra mahate
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
Karishma Khan
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
manisha0902
 
3d passwords
3d passwords3d passwords
3d passwords
shwetaag
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Akhi Balakrishnan
 
3 d password
3 d password3 d password
3 d password
ASHOK KUMAR PALAKI
 
3d password
3d password3d password
3d password
shivi123456
 
SRAVYA
SRAVYASRAVYA
SRAVYA
pvpsit
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
BERASUDARSHAN
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Amrit Sharma
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
Saddam Ahmed
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
Sunanda Bansal
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
Gowsalyasri
 

What's hot (20)

3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D password
3D password 3D password
3D password
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
3 d password
3 d password3 d password
3 d password
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3 d password
3 d password3 d password
3 d password
 
3d password
3d password3d password
3d password
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 

Viewers also liked

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
suresh5c2
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
Ramesh Goud
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
Brian_Elliott
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
Kanishka Khandelwal
 
Iptv
IptvIptv
5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY
Ligi Soosaiya
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
priyanka reddy
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
Raga Deepthi
 
Doc of 5 pen pc technology
Doc of 5 pen pc technologyDoc of 5 pen pc technology
Doc of 5 pen pc technology
Manasa Bommareddy
 
3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
atinav242
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 

Viewers also liked (13)

3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
Senior Project: Final Presentation
Senior Project: Final PresentationSenior Project: Final Presentation
Senior Project: Final Presentation
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
Iptv
IptvIptv
Iptv
 
5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY5 PEN PC TECHNOLOGY
5 PEN PC TECHNOLOGY
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
Doc of 5 pen pc technology
Doc of 5 pen pc technologyDoc of 5 pen pc technology
Doc of 5 pen pc technology
 
3D Password
3D Password3D Password
3D Password
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Ppt on 3d password (2)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpassword
3dpassword3dpassword
3d
3d3d
Vivek
VivekVivek
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
janapriyanaidu
 
3D - password
3D - password3D - password
3D - password
BhavikParmar24
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
kuldeepdhakad
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
ramyasaikondapi
 
C0361419
C0361419C0361419
C0361419
iosrjournals
 
3d pass words
3d pass words3d pass words
3d pass words
mkanth
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
IOSR Journals
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
SamruddhiGorhe1
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
Tapesh Chalisgaonkar
 
3 d
3 d3 d
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
Deepak Choudhary
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
Richa Agarwal
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
Ajay Kumar
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
sunil kumar
 

Similar to Ppt on 3d password (2) (20)

3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
Vivek
VivekVivek
Vivek
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3D - password
3D - password3D - password
3D - password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
C0361419
C0361419C0361419
C0361419
 
3d pass words
3d pass words3d pass words
3d pass words
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
wepik-enhancing-security-a-comprehensive-overview-of-3d-password-with-archite...
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
3 d
3 d3 d
3 d
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

Ppt on 3d password (2)

  • 1.
  • 2. 3D Password3D Password PRESENTED BY:-PRESENTED BY:- Meera yadavMeera yadav Asim baigAsim baig S7,CSE DepartmentS7,CSE Department
  • 3. TTable of contentable of content S.no. Topic name Page no. 1 Introduction 4 2 Existing system 5 3 Human authentication techniques 6 4 3D password 7 5 Brief description of system 8-9 6 Virtual object 10 7 3D virtual environment 11 8 Design guidelines 12 9 System implementation 13 10 Application 14 11 State diagram 15 12 Advantages 16 13 Conclusion 17 14 Query or any doubts 18
  • 4. IIntroductionntroduction::(Need and Purpose)(Need and Purpose) Need:-Need:-  Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness because simple password is only based on humanbecause simple password is only based on human memory . So now a days a new technique are usememory . So now a days a new technique are use called 3D password is used.called 3D password is used. Purpose:-Purpose:-  3D password provide secure services you with a3D password provide secure services you with a password to protect your online transactions.password to protect your online transactions.  Easy to accessEasy to access
  • 5. EExisting system for securityxisting system for security  Textual passwordTextual password  Graphical passwordGraphical password  BiometricsBiometrics  Token basedToken based
  • 6. HHuman authentication techniquesuman authentication techniques  Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password  TokenToken based(what you have)based(what you have) ATM cardsATM cards KeysKeys ID cardsID cards  Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
  • 7. 33D passwordD password  A 3D passwords which areA 3D passwords which are more customizable, and verymore customizable, and very interesting way ofinteresting way of authentication.authentication.  A 3D password isA 3D password is multifactor authenticationmultifactor authentication scheme that combines-scheme that combines- RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometrics is one authentication system.is one authentication system.
  • 8. BBrief description of systemrief description of system  The 3D password presents in theThe 3D password presents in the VirtualVirtual environmentenvironment containing various virtual objects.containing various virtual objects.  The user walks through in the environment andThe user walks through in the environment and interacts with the objects.interacts with the objects.  It is the combination and sequence of userIt is the combination and sequence of user interactions that occur in the 3d environment.interactions that occur in the 3d environment.
  • 9. The user presented with this 3D virtualThe user presented with this 3D virtual environment where the user navigates andenvironment where the user navigates and interacts with various objects.interacts with various objects. The sequence of action and interaction towardsThe sequence of action and interaction towards the objects inside the 3D environment constructsthe objects inside the 3D environment constructs the user’s 3D password.the user’s 3D password.
  • 10. VVirtual objectsirtual objects Virtual objects can be any object weVirtual objects can be any object we encounter in real Life-encounter in real Life-  A computer on which user can type.A computer on which user can type.  A fingerprint reader that requires userA fingerprint reader that requires user fingerprints.fingerprints.  An automated teller (ATM) machineAn automated teller (ATM) machine that requires a token.that requires a token.  A light that can be switched on/off.A light that can be switched on/off.  A television or radio.A television or radio.  A car that can be driven.A car that can be driven.  A graphical password scheme.A graphical password scheme.
  • 11. 33D virtual environmentD virtual environment The 3D environment effects the usability,The 3D environment effects the usability, effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D password system.password system. The 3D environment reflects the administrationThe 3D environment reflects the administration needs and security requirements.needs and security requirements.
  • 12. DDesign guidelineesign guideline  The design of 3D virtual environment shouldThe design of 3D virtual environment should follows these guidelines:follows these guidelines:
  • 13. SSystem implementationystem implementation For example, the user can enter the virtualFor example, the user can enter the virtual environment and type something on a computer thatenvironment and type something on a computer that exists in (x1,y1,z1) position.exists in (x1,y1,z1) position. Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide his/her fingerprint.his/her fingerprint. Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
  • 14. AApplicationspplications The 3D password’s main application domains areThe 3D password’s main application domains are protecting critical systems and resources.protecting critical systems and resources.  Critical serversCritical servers  Nuclear reactors and military facilitiesNuclear reactors and military facilities  Airplanes and missile guidingAirplanes and missile guiding  In addition, the 3D password can be used in theIn addition, the 3D password can be used in the less critical systemsless critical systems  A small virtual environment can be used in theA small virtual environment can be used in the following system like: ATM, personal digitalfollowing system like: ATM, personal digital assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web authentication etc.
  • 16. AAdvantagesdvantages  Provide securityProvide security  3D password can not take by3D password can not take by other personother person  3D graphical password has no3D graphical password has no limitlimit  Implementation of system is easyImplementation of system is easy  Password can remember easilyPassword can remember easily  Password helps to keep lot ofPassword helps to keep lot of personal details.personal details.
  • 17. CConclusiononclusion  The authenticationThe authentication can be improved with 3Dcan be improved with 3D passwordpassword, because unauthorized person may not, because unauthorized person may not interact with same object at a particular locationinteract with same object at a particular location as the legitimate user.as the legitimate user.  It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed number of steps and a particular procedure.number of steps and a particular procedure.  Added with token and biometrics this schemaAdded with token and biometrics this schema becomes almostbecomes almost unbreakableunbreakable..
  • 18. All of youAll of you Any Doubts????????????Any Doubts????????????