50% found this document useful (2 votes)
6K views18 pages

3d Password

The document discusses different identification and password methods, including 3D passwords. It describes 3D passwords as a multifactor authentication scheme where the user navigates and interacts with virtual objects in a 3D environment to construct their password. The sequence of interactions serves as the password. The document provides guidelines for designing effective 3D virtual environments for passwords, noting they should resemble real life and have unique, distinguishable objects. It suggests 3D passwords could be useful for critical systems like servers, military facilities, and airplanes.

Uploaded by

Vinod Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
6K views18 pages

3d Password

The document discusses different identification and password methods, including 3D passwords. It describes 3D passwords as a multifactor authentication scheme where the user navigates and interacts with virtual objects in a 3D environment to construct their password. The sequence of interactions serves as the password. The document provides guidelines for designing effective 3D virtual environments for passwords, noting they should resemble real life and have unique, distinguishable objects. It suggests 3D passwords could be useful for critical systems like servers, military facilities, and airplanes.

Uploaded by

Vinod Reddy
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 18

3-D password

By: G.Chaitanya 08N71A0519 CSE-A

Agenda Identification Passwords Passphrase Biometrics 3-d password

Three Basic Identification Methods of password


Possession (something I have)
Keys Passport Smart Card

Knowledge (something I know)

Password PIN

Biometrics (something I am)


Face Fingerprint Iris

Password It is basically an encryption algorithms.

Usually it is 8-15 character or slightly more than that.


Mostly textual passwords nowadays, are kept very simple say a word from the dictionary or their pet names, friends etc.

passphrase Its nothing but the enhance version of password. Usually it is a combination of words or simply collection of password in proper sequence is passphrase. It contains any well known thought also.

Length of passphrase is about 30-50 character or more than that also. But it has also some limitations because 30-50 character is creates ambiguity to remember if there is no any proper sequence.

Biometrics
Refer to a broad range of technologies Automate the identification or verification of an individual Based on human characteristics or body organs
Physiological: Face, fingerprint, iris Behavioral: Hand-written signature, voice
Characteristics Templates

011001010010101 011010100100110 001100010010010...

3-D password
The 3D passwords which are more customizable, and very interesting way of authentication. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the users 3-D password.

3-D Virtual Environment

Virtual objects can be any object that we encounter in real life. Moreover, any user input (such as speaking in a specific location) in the virtual 3-D environment can be considered as a part of the 3-D password.

Snapshot of a proof-of-concept virtual art gallery, which contains 36 pictures and six computers.

DESIGN

Designing a well-studied 3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. The design of 3-D virtual environments should follow these guidelines..

1) Real-life similarity 2) Object uniqueness and distinction 3) Three-dimensional virtual environment size 4) Number of objects (items) and their types

5) System importance

Possible critical applications include the

following.
1) Critical servers

2) Nuclear and military facilities


3) Airplanes and jetfighters

A small 3-D virtual environment can be used in many systems, including the following: 1) ATMs 2) personal digital assistants 3) desktop computers and laptop logins 4) web authentication

THANK YOU

You might also like