3D Password3D Password
PRESENTED BY:-PRESENTED BY:-
Meera yadavMeera yadav
Asim baigAsim baig
S7,CSE DepartmentS7,CSE Department
TTable of contentable of content
S.no. Topic name Page no.
1 Introduction 4
2 Existing system 5
3 Human authentication techniques 6
4 3D password 7
5 Brief description of system 8-9
6 Virtual object 10
7 3D virtual environment 11
8 Design guidelines 12
9 System implementation 13
10 Application 14
11 State diagram 15
12 Advantages 16
13 Conclusion 17
14 Query or any doubts 18
IIntroductionntroduction::(Need and Purpose)(Need and Purpose)
Need:-Need:-
 Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness
because simple password is only based on humanbecause simple password is only based on human
memory . So now a days a new technique are usememory . So now a days a new technique are use
called 3D password is used.called 3D password is used.
Purpose:-Purpose:-
 3D password provide secure services you with a3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions.
 Easy to accessEasy to access
EExisting system for securityxisting system for security
 Textual passwordTextual password
 Graphical passwordGraphical password
 BiometricsBiometrics
 Token basedToken based
HHuman authentication techniquesuman authentication techniques
 Knowledge based (what you know)Knowledge based (what you know)
Textual passwordTextual password
 TokenToken based(what you have)based(what you have)
ATM cardsATM cards
KeysKeys
ID cardsID cards
 Biometrics(what you are)Biometrics(what you are)
Fingerprints,PalmprintsFingerprints,Palmprints
Hand geometryHand geometry
Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
33D passwordD password
 A 3D passwords which areA 3D passwords which are
more customizable, and verymore customizable, and very
interesting way ofinteresting way of
authentication.authentication.
 A 3D password isA 3D password is
multifactor authenticationmultifactor authentication
scheme that combines-scheme that combines-
RecognitionRecognition
+Recall+Recall
+Tokens+Tokens
+Biometrics+Biometrics
is one authentication system.is one authentication system.
BBrief description of systemrief description of system
 The 3D password presents in theThe 3D password presents in the VirtualVirtual
environmentenvironment containing various virtual objects.containing various virtual objects.
 The user walks through in the environment andThe user walks through in the environment and
interacts with the objects.interacts with the objects.
 It is the combination and sequence of userIt is the combination and sequence of user
interactions that occur in the 3d environment.interactions that occur in the 3d environment.
The user presented with this 3D virtualThe user presented with this 3D virtual
environment where the user navigates andenvironment where the user navigates and
interacts with various objects.interacts with various objects.
The sequence of action and interaction towardsThe sequence of action and interaction towards
the objects inside the 3D environment constructsthe objects inside the 3D environment constructs
the user’s 3D password.the user’s 3D password.
VVirtual objectsirtual objects
Virtual objects can be any object weVirtual objects can be any object we
encounter in real Life-encounter in real Life-
 A computer on which user can type.A computer on which user can type.
 A fingerprint reader that requires userA fingerprint reader that requires user
fingerprints.fingerprints.
 An automated teller (ATM) machineAn automated teller (ATM) machine
that requires a token.that requires a token.
 A light that can be switched on/off.A light that can be switched on/off.
 A television or radio.A television or radio.
 A car that can be driven.A car that can be driven.
 A graphical password scheme.A graphical password scheme.
33D virtual environmentD virtual environment
The 3D environment effects the usability,The 3D environment effects the usability,
effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D
password system.password system.
The 3D environment reflects the administrationThe 3D environment reflects the administration
needs and security requirements.needs and security requirements.
DDesign guidelineesign guideline
 The design of 3D virtual environment shouldThe design of 3D virtual environment should
follows these guidelines:follows these guidelines:
SSystem implementationystem implementation
For example, the user can enter the virtualFor example, the user can enter the virtual
environment and type something on a computer thatenvironment and type something on a computer that
exists in (x1,y1,z1) position.exists in (x1,y1,z1) position.
Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition
device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide
his/her fingerprint.his/her fingerprint.
Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car
door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
AApplicationspplications
The 3D password’s main application domains areThe 3D password’s main application domains are
protecting critical systems and resources.protecting critical systems and resources.
 Critical serversCritical servers
 Nuclear reactors and military facilitiesNuclear reactors and military facilities
 Airplanes and missile guidingAirplanes and missile guiding
 In addition, the 3D password can be used in theIn addition, the 3D password can be used in the
less critical systemsless critical systems
 A small virtual environment can be used in theA small virtual environment can be used in the
following system like: ATM, personal digitalfollowing system like: ATM, personal digital
assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web
authentication etc.
SState diagramtate diagram
AAdvantagesdvantages
 Provide securityProvide security
 3D password can not take by3D password can not take by
other personother person
 3D graphical password has no3D graphical password has no
limitlimit
 Implementation of system is easyImplementation of system is easy
 Password can remember easilyPassword can remember easily
 Password helps to keep lot ofPassword helps to keep lot of
personal details.personal details.
CConclusiononclusion
 The authenticationThe authentication can be improved with 3Dcan be improved with 3D
passwordpassword, because unauthorized person may not, because unauthorized person may not
interact with same object at a particular locationinteract with same object at a particular location
as the legitimate user.as the legitimate user.
 It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed
number of steps and a particular procedure.number of steps and a particular procedure.
 Added with token and biometrics this schemaAdded with token and biometrics this schema
becomes almostbecomes almost unbreakableunbreakable..
All of youAll of you
Any Doubts????????????Any Doubts????????????

Ppt on 3d password (2)

  • 2.
    3D Password3D Password PRESENTEDBY:-PRESENTED BY:- Meera yadavMeera yadav Asim baigAsim baig S7,CSE DepartmentS7,CSE Department
  • 3.
    TTable of contentableof content S.no. Topic name Page no. 1 Introduction 4 2 Existing system 5 3 Human authentication techniques 6 4 3D password 7 5 Brief description of system 8-9 6 Virtual object 10 7 3D virtual environment 11 8 Design guidelines 12 9 System implementation 13 10 Application 14 11 State diagram 15 12 Advantages 16 13 Conclusion 17 14 Query or any doubts 18
  • 4.
    IIntroductionntroduction::(Need and Purpose)(Needand Purpose) Need:-Need:-  Current Authentication suffers from many weaknessCurrent Authentication suffers from many weakness because simple password is only based on humanbecause simple password is only based on human memory . So now a days a new technique are usememory . So now a days a new technique are use called 3D password is used.called 3D password is used. Purpose:-Purpose:-  3D password provide secure services you with a3D password provide secure services you with a password to protect your online transactions.password to protect your online transactions.  Easy to accessEasy to access
  • 5.
    EExisting system forsecurityxisting system for security  Textual passwordTextual password  Graphical passwordGraphical password  BiometricsBiometrics  Token basedToken based
  • 6.
    HHuman authentication techniquesumanauthentication techniques  Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password  TokenToken based(what you have)based(what you have) ATM cardsATM cards KeysKeys ID cardsID cards  Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
  • 7.
    33D passwordD password A 3D passwords which areA 3D passwords which are more customizable, and verymore customizable, and very interesting way ofinteresting way of authentication.authentication.  A 3D password isA 3D password is multifactor authenticationmultifactor authentication scheme that combines-scheme that combines- RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometrics is one authentication system.is one authentication system.
  • 8.
    BBrief description ofsystemrief description of system  The 3D password presents in theThe 3D password presents in the VirtualVirtual environmentenvironment containing various virtual objects.containing various virtual objects.  The user walks through in the environment andThe user walks through in the environment and interacts with the objects.interacts with the objects.  It is the combination and sequence of userIt is the combination and sequence of user interactions that occur in the 3d environment.interactions that occur in the 3d environment.
  • 9.
    The user presentedwith this 3D virtualThe user presented with this 3D virtual environment where the user navigates andenvironment where the user navigates and interacts with various objects.interacts with various objects. The sequence of action and interaction towardsThe sequence of action and interaction towards the objects inside the 3D environment constructsthe objects inside the 3D environment constructs the user’s 3D password.the user’s 3D password.
  • 10.
    VVirtual objectsirtual objects Virtualobjects can be any object weVirtual objects can be any object we encounter in real Life-encounter in real Life-  A computer on which user can type.A computer on which user can type.  A fingerprint reader that requires userA fingerprint reader that requires user fingerprints.fingerprints.  An automated teller (ATM) machineAn automated teller (ATM) machine that requires a token.that requires a token.  A light that can be switched on/off.A light that can be switched on/off.  A television or radio.A television or radio.  A car that can be driven.A car that can be driven.  A graphical password scheme.A graphical password scheme.
  • 11.
    33D virtual environmentDvirtual environment The 3D environment effects the usability,The 3D environment effects the usability, effectiveness and acceptability of the 3Deffectiveness and acceptability of the 3D password system.password system. The 3D environment reflects the administrationThe 3D environment reflects the administration needs and security requirements.needs and security requirements.
  • 12.
    DDesign guidelineesign guideline The design of 3D virtual environment shouldThe design of 3D virtual environment should follows these guidelines:follows these guidelines:
  • 13.
    SSystem implementationystem implementation Forexample, the user can enter the virtualFor example, the user can enter the virtual environment and type something on a computer thatenvironment and type something on a computer that exists in (x1,y1,z1) position.exists in (x1,y1,z1) position. Then enter in a room that has a fingerprint recognitionThen enter in a room that has a fingerprint recognition device that exists in a position (x2,y2,z2) and providedevice that exists in a position (x2,y2,z2) and provide his/her fingerprint.his/her fingerprint. Then the user can go the virtual garage, open the carThen the user can go the virtual garage, open the car door and turn on the radio to a specific channel.door and turn on the radio to a specific channel.
  • 14.
    AApplicationspplications The 3D password’smain application domains areThe 3D password’s main application domains are protecting critical systems and resources.protecting critical systems and resources.  Critical serversCritical servers  Nuclear reactors and military facilitiesNuclear reactors and military facilities  Airplanes and missile guidingAirplanes and missile guiding  In addition, the 3D password can be used in theIn addition, the 3D password can be used in the less critical systemsless critical systems  A small virtual environment can be used in theA small virtual environment can be used in the following system like: ATM, personal digitalfollowing system like: ATM, personal digital assistance, desktop computers and laptops, webassistance, desktop computers and laptops, web authentication etc.
  • 15.
  • 16.
    AAdvantagesdvantages  Provide securityProvidesecurity  3D password can not take by3D password can not take by other personother person  3D graphical password has no3D graphical password has no limitlimit  Implementation of system is easyImplementation of system is easy  Password can remember easilyPassword can remember easily  Password helps to keep lot ofPassword helps to keep lot of personal details.personal details.
  • 17.
    CConclusiononclusion  The authenticationTheauthentication can be improved with 3Dcan be improved with 3D passwordpassword, because unauthorized person may not, because unauthorized person may not interact with same object at a particular locationinteract with same object at a particular location as the legitimate user.as the legitimate user.  It isIt is difficult to crackdifficult to crack, because it has no fixed, because it has no fixed number of steps and a particular procedure.number of steps and a particular procedure.  Added with token and biometrics this schemaAdded with token and biometrics this schema becomes almostbecomes almost unbreakableunbreakable..
  • 18.
    All of youAllof you Any Doubts????????????Any Doubts????????????