Upload
asim-mirza
View
176
Download
9
Embed Size (px)
Citation preview
3D Password3D Password
PRESENTED BY:- PRESENTED BY:-
Meera yadavMeera yadav Asim baig Asim baig
S7,CSE DepartmentS7,CSE Department
TTable of contentable of contentS.no. Topic name Page no.1 Introduction 42 Existing system 53 Human authentication techniques 6
4 3D password 75 Brief description of system 8-96 Virtual object 107 3D virtual environment 11
8 Design guidelines 129 System implementation 1310 Application 1411 State diagram 1512 Advantages 1613 Conclusion 1714 Query or any doubts 18
IIntroductionntroduction::(Need and (Need and Purpose)Purpose)
Need:-Need:- Current Authentication suffers from many weakness Current Authentication suffers from many weakness
because simple password is only based on human because simple password is only based on human memory . So now a days a new technique are use memory . So now a days a new technique are use called 3D password is used.called 3D password is used.
Purpose:- Purpose:- 3D password provide secure services you with a 3D password provide secure services you with a
password to protect your online transactions.password to protect your online transactions. Easy to accessEasy to access
EExisting system for xisting system for securitysecurity
Textual passwordTextual password Graphical password Graphical password BiometricsBiometrics Token basedToken based
HHuman authentication uman authentication techniquestechniques
Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password TokenToken based(what you have) based(what you have) ATM cards ATM cards KeysKeys ID cardsID cards Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina
33D passwordD password A 3D passwords which A 3D passwords which
are more customizable, are more customizable, and very interesting way and very interesting way of authentication.of authentication.
A 3D password is A 3D password is multifactor multifactor authentication scheme authentication scheme that combines-that combines-
RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometricsis one authentication is one authentication
system.system.
BBrief description of rief description of systemsystem
The 3D password presents in the The 3D password presents in the Virtual Virtual environment environment containing various virtual containing various virtual objects.objects.
The user walks through in the environment The user walks through in the environment and interacts with the objects.and interacts with the objects.
It is the combination and sequence of user It is the combination and sequence of user interactions that occur in the 3d interactions that occur in the 3d environment.environment.
The user presented with this 3D The user presented with this 3D virtual environment where the user virtual environment where the user navigates and interacts with various navigates and interacts with various objects.objects.The sequence of action and The sequence of action and interaction towards the objects inside interaction towards the objects inside the 3D environment constructs the the 3D environment constructs the user’s 3D password.user’s 3D password.
VVirtual objectsirtual objectsVirtual objects can be any object weVirtual objects can be any object weencounter in real Life-encounter in real Life- A computer on which user can A computer on which user can
type.type. A fingerprint reader that requires A fingerprint reader that requires
user fingerprints.user fingerprints. An automated teller (ATM) An automated teller (ATM)
machine that requires a token.machine that requires a token. A light that can be switched on/off.A light that can be switched on/off. A television or radio.A television or radio. A car that can be driven.A car that can be driven. A graphical password scheme.A graphical password scheme.
33D virtual D virtual environmentenvironment
The 3D environment effects the The 3D environment effects the usability, effectiveness and usability, effectiveness and
acceptability of the 3D password acceptability of the 3D password system.system.
The 3D environment reflects the The 3D environment reflects the administration needs and security administration needs and security
requirements.requirements.
DDesign guidelineesign guideline The design of 3D virtual environment The design of 3D virtual environment
shouldshould follows these guidelines:follows these guidelines:
SSystem ystem implementationimplementation
For example, the user can enter the For example, the user can enter the virtual environment and type something on virtual environment and type something on a computer that exists in (x1,y1,z1) a computer that exists in (x1,y1,z1) position.position.Then enter in a room that has a Then enter in a room that has a fingerprint recognition device that exists fingerprint recognition device that exists in a position (x2,y2,z2) and provide his/her in a position (x2,y2,z2) and provide his/her fingerprint.fingerprint.Then the user can go the virtual garage, Then the user can go the virtual garage, open the car door and turn on the radio to open the car door and turn on the radio to a specific channel.a specific channel.
AApplicationspplicationsThe 3D password’s main application domains The 3D password’s main application domains
areareprotecting critical systems and resources.protecting critical systems and resources. Critical serversCritical servers Nuclear reactors and military facilitiesNuclear reactors and military facilities Airplanes and missile guidingAirplanes and missile guiding In addition, the 3D password can be used in In addition, the 3D password can be used in
the less critical systemsthe less critical systems A small virtual environment can be used in A small virtual environment can be used in
the following system like: ATM, personal the following system like: ATM, personal digital assistance, desktop computers and digital assistance, desktop computers and laptops, web authentication etc.laptops, web authentication etc.
SState diagramtate diagram
AAdvantagesdvantages Provide securityProvide security 3D password can not take by 3D password can not take by
other personother person 3D graphical password has 3D graphical password has
no limitno limit Implementation of system is Implementation of system is
easyeasy Password can remember Password can remember
easilyeasily Password helps to keep lot of Password helps to keep lot of
personal details.personal details.
CConclusiononclusion The authentication The authentication can be improved with can be improved with
3D password3D password, because unauthorized , because unauthorized person may not interact with same object person may not interact with same object at a particular location as the legitimate at a particular location as the legitimate user.user.
It isIt is difficult to crack difficult to crack, because it has no , because it has no fixed number of steps and a particular fixed number of steps and a particular procedure.procedure.
Added with token and biometrics this Added with token and biometrics this schema becomes almost schema becomes almost unbreakableunbreakable. .
All of youAll of you Any Any Doubts????????????Doubts????????????