SlideShare une entreprise Scribd logo
1  sur  18
3D-password
                            A more secured authentication


G.Suresh babu
Roll no:08H71A05C2
Computer science & engineering
Mic college of technology
Guide:Mrs A.Jaya Lakshmi
Contents
• What is Authentication
• Existing system
• Drawbacks in existing system
• Proposed system
• Advantages with proposed system
• Applications
• Attacks
• Conclusion
Authentication


 Authentication is a process of validating who are
 you to whom you claimed to be.

• Human authentication techniques are as follows:

     1.Knowledge Base (What you know)
     2.Token Based(what you have)

     3.Biometrics(what you are)
Three Basic Identification Methods of password


Possession
(“something I have”)

                          Knowledge
•Keys
•Passport                 (“something I know”)
•Smart Card

                            •Password
                            •PIN

Biometrics
(“something I am”)

•Face
•Fingerprint
•Iris
Drawbacks
Textual Password:
  –   Textual Passwords should be easy to remember at the same time hard
      to guess
  –   Full password space for 8 characters consisting of both numbers and
      characters is 2 X 10¹⁴
  –   From an research 25% of the passwords out of 15,000 users can be
      guessed correctly by using brute force dictionary
Graphical Password

         One main drawback of applying biometric is its intrusiveness upon
          a users personnel characteristics.

         They require special scanning device to authenticate the user
          which is not acceptable for remote and internet users.
3d password
The 3D Password is a multifactor authentication scheme that combine
 RECOGNITION
            + RECALL
                     +TOKENS
                           +BIOMETRIC
                                     In one authentication system
 The 3D password presents a virtual environment containing various
virtual objects.

 The user walks through the environment and interacts with the
objects

 The 3d Password is simply the combination and sequence of user
interactions that occur in the 3D environment
3D environment




Snapshot of a virtual environment , which contains 36
pictures and six computers as virtual objects
Virtual objects

• Virtual objects can be any object we encounter in real life:
             A computer on which the user can type
             A fingerprint reader that requires users fingerprint
             A paper or white board on which user can type
             A Automated teller(ATM) machine that requires a token
             A light that can be switched on/off
             A television or radio
             A car that can be driven
             A graphical password scheme
System implementation


• The action towards an object that exists in location (x1,y1,z1)
   is different from action towards an another object at (x2,y2,z2).


• Therefore ,to perform the legitimate 3d password the user must
  follow the same scenario performed by the legitimate user.


• This means interacting with the same objects that reside at exact
  location and perform the exact actions in the proper sequence
example

 Let us consider a 3D virtual environment space of size G ×G × G.
The 3D environment space is represented by the coordinates (x, y, z) ∈
[1, . . . , G] ×[1, . . . , G] ×[1, . . . , G].

The objects are distributed in the 3D virtual environment with unique (x,
y, z) coordinates. We assume that the user can navigate into the 3D
virtual environment and interact with the objects using any input device
such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card
reader, and microphone.
 For example, consider a user who navigates through the 3D virtual
environment that consists of an office and a meeting room. Let us assume that
the user is in the virtual office and the user turns around to the door located in
(10, 24, 91) and opens it. Then, the user closes the door. The user then finds a
computer to the left, which exists in the position (4, 34, 18), and the user types
“CAT.” The initial representation of user actions in the 3Dvirtual environment
can be recorded as follows::


  *(10, 24, 91) Action = Open the office door;
  *(10, 24, 91) Action = Close the office door;
  *(4, 34, 18) Action = Typing, “C”;
  *(4, 34, 18) Action = Typing, “A”;
  *(4, 34, 18) Action = Typing, “T”;
Advantages


 Flexibility: 3D Passwords allows Multifactor
  authentication biometric , textual passwords can be
  embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
  passwords possibility.
 Ease to Memorize: can be remembered in the form
  of short story.
 Respect of Privacy: Organizers can select
  authentication schemes that respect users privacy.
Applications
    The 3D password can have a password space that is very large
compared to other authentication schemes, so the 3D password’s main
application domains are protecting critical systems and resources.



  Critical Servers:


  Nuclear Reactors & military Facilities:


 Airplanes and missile Guiding:
Applications

In addition,3D password can also be used in less critical systems

A small virtual environment can be used in the following systems like

Atm

Personal digital assistance

Desktop computers & laptops

Web authentication etc..,
Attacks and counter measures



   Brute Force Attack


   Well studied Attack


   Shoulder--surfing Attack
Conclusion


The authentication can be improved with 3d password ,because the
un- authorized person may not interact with same object at a particular
location as the legitimate user.


It is difficult to crack ,because it has no fixed no of steps and a
particular procedure



Added with biometrics and token verification this schema becomes
almost unbreakable
3d password by suresh
3d password by suresh

Contenu connexe

Tendances

3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure AuthenticationMahesh Gadhwal
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importanceshubhangi singh
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbha nandan
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDKarishma Khan
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14Saddam Ahmed
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
SRAVYA
SRAVYASRAVYA
SRAVYApvpsit
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Finger tracking in mobile human compuetr interaction
Finger tracking in mobile human compuetr interactionFinger tracking in mobile human compuetr interaction
Finger tracking in mobile human compuetr interactionAkhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 

Tendances (20)

3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
SEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORDSEMINAR REPORT ON 3D PASSWORD
SEMINAR REPORT ON 3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
SRAVYA
SRAVYASRAVYA
SRAVYA
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Finger tracking in mobile human compuetr interaction
Finger tracking in mobile human compuetr interactionFinger tracking in mobile human compuetr interaction
Finger tracking in mobile human compuetr interaction
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 

En vedette

Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)ASIM MIRZA
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation pptParth Godhani
 
presentation on 3D Technology
presentation on 3D Technologypresentation on 3D Technology
presentation on 3D TechnologyMatti Ur Rehman
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW Neha Tyagi
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02ajaykumar557
 

En vedette (18)

3D Password
3D Password3D Password
3D Password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D password
3D password3D password
3D password
 
3d internet
3d internet3d internet
3d internet
 
Rain technology
Rain technologyRain technology
Rain technology
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Blue Brain
Blue Brain Blue Brain
Blue Brain
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
Google glass glasses presentation ppt
Google glass glasses presentation pptGoogle glass glasses presentation ppt
Google glass glasses presentation ppt
 
Airborne internet
Airborne internetAirborne internet
Airborne internet
 
presentation on 3D Technology
presentation on 3D Technologypresentation on 3D Technology
presentation on 3D Technology
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 

Similaire à 3d password by suresh (20)

3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D Password
3D Password3D Password
3D Password
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3dpassword
3dpassword3dpassword
3dpassword
 
3d
3d3d
3d
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3dpassword.doc
3dpassword.doc3dpassword.doc
3dpassword.doc
 
3d pass words
3d pass words3d pass words
3d pass words
 
Vivek
VivekVivek
Vivek
 
3D Password
3D Password3D Password
3D Password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
C0361419
C0361419C0361419
C0361419
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
3 d ppt
3 d ppt3 d ppt
3 d ppt
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 

Dernier

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Dernier (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

3d password by suresh

  • 1. 3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi
  • 2. Contents • What is Authentication • Existing system • Drawbacks in existing system • Proposed system • Advantages with proposed system • Applications • Attacks • Conclusion
  • 3. Authentication Authentication is a process of validating who are you to whom you claimed to be. • Human authentication techniques are as follows: 1.Knowledge Base (What you know) 2.Token Based(what you have) 3.Biometrics(what you are)
  • 4. Three Basic Identification Methods of password Possession (“something I have”) Knowledge •Keys •Passport (“something I know”) •Smart Card •Password •PIN Biometrics (“something I am”) •Face •Fingerprint •Iris
  • 5. Drawbacks Textual Password: – Textual Passwords should be easy to remember at the same time hard to guess – Full password space for 8 characters consisting of both numbers and characters is 2 X 10¹⁴ – From an research 25% of the passwords out of 15,000 users can be guessed correctly by using brute force dictionary Graphical Password  One main drawback of applying biometric is its intrusiveness upon a users personnel characteristics.  They require special scanning device to authenticate the user which is not acceptable for remote and internet users.
  • 6. 3d password The 3D Password is a multifactor authentication scheme that combine RECOGNITION + RECALL +TOKENS +BIOMETRIC In one authentication system  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects  The 3d Password is simply the combination and sequence of user interactions that occur in the 3D environment
  • 7. 3D environment Snapshot of a virtual environment , which contains 36 pictures and six computers as virtual objects
  • 8. Virtual objects • Virtual objects can be any object we encounter in real life:  A computer on which the user can type  A fingerprint reader that requires users fingerprint  A paper or white board on which user can type  A Automated teller(ATM) machine that requires a token  A light that can be switched on/off  A television or radio  A car that can be driven  A graphical password scheme
  • 9. System implementation • The action towards an object that exists in location (x1,y1,z1) is different from action towards an another object at (x2,y2,z2). • Therefore ,to perform the legitimate 3d password the user must follow the same scenario performed by the legitimate user. • This means interacting with the same objects that reside at exact location and perform the exact actions in the proper sequence
  • 10. example  Let us consider a 3D virtual environment space of size G ×G × G. The 3D environment space is represented by the coordinates (x, y, z) ∈ [1, . . . , G] ×[1, . . . , G] ×[1, . . . , G]. The objects are distributed in the 3D virtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3D virtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone.
  • 11.  For example, consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “CAT.” The initial representation of user actions in the 3Dvirtual environment can be recorded as follows:: *(10, 24, 91) Action = Open the office door; *(10, 24, 91) Action = Close the office door; *(4, 34, 18) Action = Typing, “C”; *(4, 34, 18) Action = Typing, “A”; *(4, 34, 18) Action = Typing, “T”;
  • 12. Advantages  Flexibility: 3D Passwords allows Multifactor authentication biometric , textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 13. Applications The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D password’s main application domains are protecting critical systems and resources.  Critical Servers:  Nuclear Reactors & military Facilities: Airplanes and missile Guiding:
  • 14. Applications In addition,3D password can also be used in less critical systems A small virtual environment can be used in the following systems like Atm Personal digital assistance Desktop computers & laptops Web authentication etc..,
  • 15. Attacks and counter measures  Brute Force Attack  Well studied Attack  Shoulder--surfing Attack
  • 16. Conclusion The authentication can be improved with 3d password ,because the un- authorized person may not interact with same object at a particular location as the legitimate user. It is difficult to crack ,because it has no fixed no of steps and a particular procedure Added with biometrics and token verification this schema becomes almost unbreakable