3d password

Preview:

DESCRIPTION

i make my ppt with different effects and pictures.so enjoy

Citation preview

INTRODUCTIONCommonly used authentication

scheme are textual passwords, graphical password and biometrics.

Combine recognition , recall ,token and biometrics based system.

User choice select a type of authentication technique.

In this paper , we present and evaluate our contribution that is a

3D PASSWORD.

AuthenticationAuthentication is a process of validating who you are to whom you claimed to be.

SCHEME……

KNOWLEDGE BASED

1. Recall based

2. Recognition based

TOKEN BASED

e.g: smart card

BIOMETRICS

Automate the identification or verification of individual .

The 3D passwords which are more customizable, and very interesting way of authentication.

A 3D password is a multifactor authentication scheme that combine.

RECOGNITION

+ RECALL

+ TOKENS

+ BIOMETRICS

in one authentication system.

The 3D password presents a virtual environment containing various virtual

object.

The user walk through the environment and interact with the objects.

It is the combination and sequence of user interaction that occur in the

3D environment.

3D VIRTUAL ENVIRONMENT

o 3-D virtual environment affects the usability ,effectiveness and acceptability of a 3d password system.

o 3-D environment reflects the administration needs and the security requirements.

The design of virtual environment should follow these guidelines:

Real Life Similarity

Object Uniqueness & Distinction

3D Virtual Environment Size

Number of objects & their types

System Importance

A small virtual environment can be used in the following system like- Atm

Personal digital assistance

Desktop computer & laptop

Web authentication etc.

Attacks and Countermeasures

Brute Force Attack

Well studied Attack

Shoulder-surfing Attack

Applications

Critical Servers

Nuclear Reactors & military Facilities

Airplanes and missile Guiding

Advantages

Flexibility

Strength

Ease to Memorize

Respect of Privacy

Conclusion• The authentication can be improved with 3D password ,

because the unauthorized person may not interact with

same object at a particular location as the legitimate user.

• It is Difficult to crack ,because it has no fixed number of

steps and particular procedure.

• Added with biometrics and token verification this scheme

because almost unbreakable.

THANK YOU ……

Recommended