18

Ppt on 3d password (2)

Embed Size (px)

Citation preview

Page 1: Ppt on 3d password (2)
Page 2: Ppt on 3d password (2)

3D Password3D Password

PRESENTED BY:- PRESENTED BY:-

Meera yadavMeera yadav Asim baig Asim baig

S7,CSE DepartmentS7,CSE Department

Page 3: Ppt on 3d password (2)

TTable of contentable of contentS.no. Topic name Page no.1 Introduction 42 Existing system 53 Human authentication techniques 6

4 3D password 75 Brief description of system 8-96 Virtual object 107 3D virtual environment 11

8 Design guidelines 129 System implementation 1310 Application 1411 State diagram 1512 Advantages 1613 Conclusion 1714 Query or any doubts 18

Page 4: Ppt on 3d password (2)

IIntroductionntroduction::(Need and (Need and Purpose)Purpose)

Need:-Need:- Current Authentication suffers from many weakness Current Authentication suffers from many weakness

because simple password is only based on human because simple password is only based on human memory . So now a days a new technique are use memory . So now a days a new technique are use called 3D password is used.called 3D password is used.

Purpose:- Purpose:- 3D password provide secure services you with a 3D password provide secure services you with a

password to protect your online transactions.password to protect your online transactions. Easy to accessEasy to access

Page 5: Ppt on 3d password (2)

EExisting system for xisting system for securitysecurity

Textual passwordTextual password Graphical password Graphical password BiometricsBiometrics Token basedToken based

Page 6: Ppt on 3d password (2)

HHuman authentication uman authentication techniquestechniques

Knowledge based (what you know)Knowledge based (what you know) Textual passwordTextual password TokenToken based(what you have) based(what you have) ATM cards ATM cards KeysKeys ID cardsID cards Biometrics(what you are)Biometrics(what you are) Fingerprints,PalmprintsFingerprints,Palmprints Hand geometryHand geometry Face,Iris,Voice,RetinaFace,Iris,Voice,Retina

Page 7: Ppt on 3d password (2)

33D passwordD password A 3D passwords which A 3D passwords which

are more customizable, are more customizable, and very interesting way and very interesting way of authentication.of authentication.

A 3D password is A 3D password is multifactor multifactor authentication scheme authentication scheme that combines-that combines-

RecognitionRecognition +Recall+Recall +Tokens+Tokens +Biometrics+Biometricsis one authentication is one authentication

system.system.

Page 8: Ppt on 3d password (2)

BBrief description of rief description of systemsystem

The 3D password presents in the The 3D password presents in the Virtual Virtual environment environment containing various virtual containing various virtual objects.objects.

The user walks through in the environment The user walks through in the environment and interacts with the objects.and interacts with the objects.

It is the combination and sequence of user It is the combination and sequence of user interactions that occur in the 3d interactions that occur in the 3d environment.environment.

Page 9: Ppt on 3d password (2)

The user presented with this 3D The user presented with this 3D virtual environment where the user virtual environment where the user navigates and interacts with various navigates and interacts with various objects.objects.The sequence of action and The sequence of action and interaction towards the objects inside interaction towards the objects inside the 3D environment constructs the the 3D environment constructs the user’s 3D password.user’s 3D password.

Page 10: Ppt on 3d password (2)

VVirtual objectsirtual objectsVirtual objects can be any object weVirtual objects can be any object weencounter in real Life-encounter in real Life- A computer on which user can A computer on which user can

type.type. A fingerprint reader that requires A fingerprint reader that requires

user fingerprints.user fingerprints. An automated teller (ATM) An automated teller (ATM)

machine that requires a token.machine that requires a token. A light that can be switched on/off.A light that can be switched on/off. A television or radio.A television or radio. A car that can be driven.A car that can be driven. A graphical password scheme.A graphical password scheme.

Page 11: Ppt on 3d password (2)

33D virtual D virtual environmentenvironment

The 3D environment effects the The 3D environment effects the usability, effectiveness and usability, effectiveness and

acceptability of the 3D password acceptability of the 3D password system.system.

The 3D environment reflects the The 3D environment reflects the administration needs and security administration needs and security

requirements.requirements.

Page 12: Ppt on 3d password (2)

DDesign guidelineesign guideline The design of 3D virtual environment The design of 3D virtual environment

shouldshould follows these guidelines:follows these guidelines:

Page 13: Ppt on 3d password (2)

SSystem ystem implementationimplementation

For example, the user can enter the For example, the user can enter the virtual environment and type something on virtual environment and type something on a computer that exists in (x1,y1,z1) a computer that exists in (x1,y1,z1) position.position.Then enter in a room that has a Then enter in a room that has a fingerprint recognition device that exists fingerprint recognition device that exists in a position (x2,y2,z2) and provide his/her in a position (x2,y2,z2) and provide his/her fingerprint.fingerprint.Then the user can go the virtual garage, Then the user can go the virtual garage, open the car door and turn on the radio to open the car door and turn on the radio to a specific channel.a specific channel.

Page 14: Ppt on 3d password (2)

AApplicationspplicationsThe 3D password’s main application domains The 3D password’s main application domains

areareprotecting critical systems and resources.protecting critical systems and resources. Critical serversCritical servers Nuclear reactors and military facilitiesNuclear reactors and military facilities Airplanes and missile guidingAirplanes and missile guiding In addition, the 3D password can be used in In addition, the 3D password can be used in

the less critical systemsthe less critical systems A small virtual environment can be used in A small virtual environment can be used in

the following system like: ATM, personal the following system like: ATM, personal digital assistance, desktop computers and digital assistance, desktop computers and laptops, web authentication etc.laptops, web authentication etc.

Page 15: Ppt on 3d password (2)

SState diagramtate diagram

Page 16: Ppt on 3d password (2)

AAdvantagesdvantages Provide securityProvide security 3D password can not take by 3D password can not take by

other personother person 3D graphical password has 3D graphical password has

no limitno limit Implementation of system is Implementation of system is

easyeasy Password can remember Password can remember

easilyeasily Password helps to keep lot of Password helps to keep lot of

personal details.personal details.

Page 17: Ppt on 3d password (2)

CConclusiononclusion The authentication The authentication can be improved with can be improved with

3D password3D password, because unauthorized , because unauthorized person may not interact with same object person may not interact with same object at a particular location as the legitimate at a particular location as the legitimate user.user.

It isIt is difficult to crack difficult to crack, because it has no , because it has no fixed number of steps and a particular fixed number of steps and a particular procedure.procedure.

Added with token and biometrics this Added with token and biometrics this schema becomes almost schema becomes almost unbreakableunbreakable. .

Page 18: Ppt on 3d password (2)

All of youAll of you Any Any Doubts????????????Doubts????????????