100% found this document useful (1 vote)
1K views17 pages

3d Password

The document proposes a 3D password authentication system that combines multiple authentication factors. Users navigate a 3D virtual environment, interacting with objects at specific coordinates to create a unique password sequence. This multi-factor approach aims to improve security over text passwords by making passwords difficult to share, write down, or guess while remaining easy for users to remember. The document outlines the existing password issues addressed, proposed system requirements and implementation, example 3D password creation, and potential applications and security analysis of the 3D password system.

Uploaded by

Venu Gopal P
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views17 pages

3d Password

The document proposes a 3D password authentication system that combines multiple authentication factors. Users navigate a 3D virtual environment, interacting with objects at specific coordinates to create a unique password sequence. This multi-factor approach aims to improve security over text passwords by making passwords difficult to share, write down, or guess while remaining easy for users to remember. The document outlines the existing password issues addressed, proposed system requirements and implementation, example 3D password creation, and potential applications and security analysis of the 3D password system.

Uploaded by

Venu Gopal P
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

3D PASSWORD

PRESENTED BY A.SWAMY(12D41D0510)

CONTENTS
INTRODUCTION

EXISTING SYSTEM
PROPOSED SYSTEM SYSTEM IMPLEMENTATION 3D PASSWORD SELECTION AND INPUT 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES 3D PASSWORD APPLICATION SECURITY ANALYSIS

INTRODUCTION
A Multifactor authentication scheme. The user login by navigating through a 3D environment.

By using this authentication scheme the user can get more security
than other schemes. The passwords are based on the fact of Human memory.

EXISTING SYSTEM
Current authentication Systems suffers from many Weaknesses. Textual passwords also will not give 100% Security.

It can be very easy for 'others' to fabricate or steal the identity


or hack some once password. Any other smart cards or tokens can be stolen.

PROPOSED SYSTEM
The proposed system is a multi factor authentication scheme that
combines the benefits of various authentication schemes. Users have the freedom to select which type of authentication scheme has to use in his 3d password. The sequence of actions and interaction with the objects in the 3D environment will create 3d password.

The following requirements are satisfied in the proposed scheme

The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. The new scheme provides secrets that are not easy to write down on paper.

Moreover, the scheme secrets should be difficult to share with others.


The new scheme provides secrets that can be easily revoked or changed.

SYSTEM IMPLEMENTATION
The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. Virtual objects can be any object that we encounter in real life.

Any obvious actions and interactions toward the real life objects
can be done in the virtual 3D environment toward the virtual objects.

The user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position. Then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions

toward the specific objects construct the users 3D password.

OBJECTS RECQUIRED
A computer with which the user can type. A fingerprint reader that requires the users fingerprint. A paper or a white board that a user can write, sign, or draw on. An automated teller machine (ATM) that requests a token. A light that can be switched on/off. A television or radio where channels can be selected. A staple that can be punched. A car that can be driven. A book that can be moved from one place to another. Any graphical password scheme. Any real life object. Any upcoming authentication scheme .

3D PASSWORD SELECTION AND INPUT


(10, 24, 91) Action = Open the office door;
(10, 24, 95) Action = Close the office door; (4, 34, 9) Action = Typing, F; (4, 34, 18) Action = Typing, A; (4, 34, 20) Action = Typing, L;

(4, 34, 21) Action = Typing, C;


(4, 34, 30) Action = Typing, O; (4, 34, 35) Action = Typing, N;

3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES


The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password

Real life similarity. Objects uniqueness. The 3D environmental size. Number of objects and their types.

3D PASSWORD APPLICATIONS
Critical server many large organizations.

Nuclear and military facilities.


Airplanes and jet fighters .

USED IN LESS CRITICAL SYSTEMS


.

ATM Personal Digital Assistance. Desktop Computers & laptop logins. Web Authentication.

Security Analysis.

STATE DIAGRAM

SECURITY ANALYSIS
Attacks and Countermeasures Brute Force Attack Time cost Shoulder Surfing Attack

Timing Attack

CONCLUSION
The 3D password is a multi factor authentication scheme that combines the various authentication schemes into a single 3D virtual environment. Designing a simple and easy to use 3D virtual environment is a factor

that leads to a higher user acceptability of a 3D password system.


The choice of what authentication scheme will be part of user's 3D password reflects the user's preferences and requirements.

Any ? Queries

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy