3d password

15

Upload: shivi123456

Post on 17-Nov-2014

590 views

Category:

Education


0 download

DESCRIPTION

i make my ppt with different effects and pictures.so enjoy

TRANSCRIPT

Page 1: 3d password
Page 2: 3d password

INTRODUCTIONCommonly used authentication

scheme are textual passwords, graphical password and biometrics.

Combine recognition , recall ,token and biometrics based system.

User choice select a type of authentication technique.

In this paper , we present and evaluate our contribution that is a

3D PASSWORD.

Page 3: 3d password

AuthenticationAuthentication is a process of validating who you are to whom you claimed to be.

SCHEME……

KNOWLEDGE BASED

1. Recall based

2. Recognition based

TOKEN BASED

e.g: smart card

Page 4: 3d password

BIOMETRICS

Automate the identification or verification of individual .

Page 5: 3d password

The 3D passwords which are more customizable, and very interesting way of authentication.

A 3D password is a multifactor authentication scheme that combine.

RECOGNITION

+ RECALL

+ TOKENS

+ BIOMETRICS

in one authentication system.

Page 6: 3d password

The 3D password presents a virtual environment containing various virtual

object.

The user walk through the environment and interact with the objects.

It is the combination and sequence of user interaction that occur in the

3D environment.

Page 7: 3d password
Page 8: 3d password

3D VIRTUAL ENVIRONMENT

o 3-D virtual environment affects the usability ,effectiveness and acceptability of a 3d password system.

o 3-D environment reflects the administration needs and the security requirements.

Page 9: 3d password

The design of virtual environment should follow these guidelines:

Real Life Similarity

Object Uniqueness & Distinction

3D Virtual Environment Size

Number of objects & their types

System Importance

Page 10: 3d password

A small virtual environment can be used in the following system like- Atm

Personal digital assistance

Desktop computer & laptop

Web authentication etc.

Page 11: 3d password

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

Page 12: 3d password

Applications

Critical Servers

Nuclear Reactors & military Facilities

Airplanes and missile Guiding

Page 13: 3d password

Advantages

Flexibility

Strength

Ease to Memorize

Respect of Privacy

Page 14: 3d password

Conclusion• The authentication can be improved with 3D password ,

because the unauthorized person may not interact with

same object at a particular location as the legitimate user.

• It is Difficult to crack ,because it has no fixed number of

steps and particular procedure.

• Added with biometrics and token verification this scheme

because almost unbreakable.

Page 15: 3d password

THANK YOU ……