3d password
DESCRIPTION
i make my ppt with different effects and pictures.so enjoyTRANSCRIPT
INTRODUCTIONCommonly used authentication
scheme are textual passwords, graphical password and biometrics.
Combine recognition , recall ,token and biometrics based system.
User choice select a type of authentication technique.
In this paper , we present and evaluate our contribution that is a
3D PASSWORD.
AuthenticationAuthentication is a process of validating who you are to whom you claimed to be.
SCHEME……
KNOWLEDGE BASED
1. Recall based
2. Recognition based
TOKEN BASED
e.g: smart card
BIOMETRICS
Automate the identification or verification of individual .
The 3D passwords which are more customizable, and very interesting way of authentication.
A 3D password is a multifactor authentication scheme that combine.
RECOGNITION
+ RECALL
+ TOKENS
+ BIOMETRICS
in one authentication system.
The 3D password presents a virtual environment containing various virtual
object.
The user walk through the environment and interact with the objects.
It is the combination and sequence of user interaction that occur in the
3D environment.
3D VIRTUAL ENVIRONMENT
o 3-D virtual environment affects the usability ,effectiveness and acceptability of a 3d password system.
o 3-D environment reflects the administration needs and the security requirements.
The design of virtual environment should follow these guidelines:
Real Life Similarity
Object Uniqueness & Distinction
3D Virtual Environment Size
Number of objects & their types
System Importance
A small virtual environment can be used in the following system like- Atm
Personal digital assistance
Desktop computer & laptop
Web authentication etc.
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
Shoulder-surfing Attack
Applications
Critical Servers
Nuclear Reactors & military Facilities
Airplanes and missile Guiding
Advantages
Flexibility
Strength
Ease to Memorize
Respect of Privacy
Conclusion• The authentication can be improved with 3D password ,
because the unauthorized person may not interact with
same object at a particular location as the legitimate user.
• It is Difficult to crack ,because it has no fixed number of
steps and particular procedure.
• Added with biometrics and token verification this scheme
because almost unbreakable.
THANK YOU ……