3.37k likes | 8.65k Views
3D PASSWORD. Prepared By Gauswami Hetal G.R.NO.707. Topic of overview. Introduction Authentication schemes Functionalities required 3D password selection and input Virtual environment design guidelines Applications Security analysis Advantages & disadvantages. Introduction.
E N D
3D PASSWORD Prepared By Gauswami Hetal G.R.NO.707
Topic of overview • Introduction • Authentication schemes • Functionalities required • 3D password selection and input • Virtual environment design guidelines • Applications • Security analysis • Advantages & disadvantages
Introduction • Commonly used authentication schemes are textual passwords, graphical passwords and biometrics. • 3D password is a multifactor authentication scheme. • To be authenticated, we require 3D virtual environment. • combines recognition, recall, token and biometrics based systems. • Users choice to select the type of authentication technique.
Knowledge based Password • Password is basically an encryption algorithms. • It is 8-15 character or slightly more than that. • Mostly textual passwords now a days are kept which are very simple.
Functionalities Required • New scheme should combine the existing authentication schemes. • Freedom to select the type of authentication techniques. • Should provide secrets that are easy to remember, difficult to guess.
3D Password Selection & Input • 3D environment space represented by the co-ordinates. • User navigate into the 3D virtual environment using any input device. • The sequence of actions and interaction forms the user 3D password.
3D Virtual Environment • 3D virtual environment affects the usability, effectiveness & acceptability of a 3D password system. • 3D environment reflects the administration needs the security requirements.
Application • Critical servers. • Nuclear & military facilities. • Airplanes & jet fighters. • ATM, desktop computers & laptops.
Disadvantages • Difficult for blind people to use this technology. • Requires sophisticated computers technology expensive. • A lot of program coding is required.