3-D password
By: G.Chaitanya 08N71A0519 CSE-A
Agenda Identification Passwords Passphrase Biometrics 3-d password
Three Basic Identification Methods of password
Possession (something I have)
Keys Passport Smart Card
Knowledge (something I know)
Password PIN
Biometrics (something I am)
Face Fingerprint Iris
Password It is basically an encryption algorithms.
Usually it is 8-15 character or slightly more than that.
Mostly textual passwords nowadays, are kept very simple say a word from the dictionary or their pet names, friends etc.
passphrase Its nothing but the enhance version of password. Usually it is a combination of words or simply collection of password in proper sequence is passphrase. It contains any well known thought also.
Length of passphrase is about 30-50 character or more than that also. But it has also some limitations because 30-50 character is creates ambiguity to remember if there is no any proper sequence.
Biometrics
Refer to a broad range of technologies Automate the identification or verification of an individual Based on human characteristics or body organs
Physiological: Face, fingerprint, iris Behavioral: Hand-written signature, voice
Characteristics Templates
011001010010101 011010100100110 001100010010010...
3-D password
The 3D passwords which are more customizable, and very interesting way of authentication. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the users 3-D password.
3-D Virtual Environment
Virtual objects can be any object that we encounter in real life. Moreover, any user input (such as speaking in a specific location) in the virtual 3-D environment can be considered as a part of the 3-D password.
Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers.
DESIGN
Designing a well-studied 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. The design of 3-D virtual environments should follow these guidelines..
1) Real-life similarity 2) Object uniqueness and distinction 3) Three-dimensional virtual environment size 4) Number of objects (items) and their types
5) System importance
Possible critical applications include the
following.
1) Critical servers
2) Nuclear and military facilities
3) Airplanes and jetfighters
A small 3-D virtual environment can be used in many systems, including the following: 1) ATMs 2) personal digital assistants 3) desktop computers and laptop logins 4) web authentication
THANK YOU