1 / 15

3D PASSWORD

3D PASSWORD. Prepared By Gauswami Hetal G.R.NO.707. Topic of overview. Introduction Authentication schemes Functionalities required 3D password selection and input Virtual environment design guidelines Applications Security analysis Advantages & disadvantages. Introduction.

tyrell
Download Presentation

3D PASSWORD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 3D PASSWORD Prepared By Gauswami Hetal G.R.NO.707

  2. Topic of overview • Introduction • Authentication schemes • Functionalities required • 3D password selection and input • Virtual environment design guidelines • Applications • Security analysis • Advantages & disadvantages

  3. Introduction • Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. • 3D password is a multifactor authentication scheme. • To be authenticated, we require 3D virtual environment. • combines recognition, recall, token and biometrics based systems. • Users choice to select the type of authentication technique.

  4. Authentication Schemes

  5. Knowledge based Password • Password is basically an encryption algorithms. • It is 8-15 character or slightly more than that. • Mostly textual passwords now a days are kept which are very simple.

  6. Functionalities Required • New scheme should combine the existing authentication schemes. • Freedom to select the type of authentication techniques. • Should provide secrets that are easy to remember, difficult to guess.

  7. 3D Password Selection & Input • 3D environment space represented by the co-ordinates. • User navigate into the 3D virtual environment using any input device. • The sequence of actions and interaction forms the user 3D password.

  8. 3D Virtual Environment • 3D virtual environment affects the usability, effectiveness & acceptability of a 3D password system. • 3D environment reflects the administration needs the security requirements.

  9. Application • Critical servers. • Nuclear & military facilities. • Airplanes & jet fighters. • ATM, desktop computers & laptops.

  10. Disadvantages • Difficult for blind people to use this technology. • Requires sophisticated computers technology expensive. • A lot of program coding is required.

More Related